Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
Package | Installed | Affected | Info |
---|---|---|---|
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
setuptools | 75.5.0 | <78.1.1 |
show Affected versions of setuptools ≤ 69.1.1 are vulnerable to path traversal and command injection in the package_index module’s download functions (CVE-2024-6345), allowing arbitrary file writes and remote code execution via crafted URLs. Vulnerable function: _resolve_download_filename fails to enforce tmpdir boundaries. |
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg :target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/ :alt: Python 3
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg :target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/ :alt: Updates
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg(Updates)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]