Path Traversal Affecting weave package, versions [,0.50.8)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (23rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-WEAVE-7577948
- published 2 Aug 2024
- disclosed 31 Jul 2024
- credit Natan Nehorai, Uriya Yavnieli
Introduced: 31 Jul 2024
CVE-2024-7340 Open this link in a new tabHow to fix?
Upgrade weave
to version 0.50.8 or higher.
Overview
weave is an A toolkit for building composable interactive data driven applications.
Affected versions of this package are vulnerable to Path Traversal due to a lack of input validation in the server API. An attacker can leak arbitrary files by manipulating file paths to traverse outside the intended directory.
Note: In various common scenarios, this allows a low-privileged user to assume the role of the server admin.