| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| python-dotenv | 0.19.0 | <1.2.2 |
show Affected versions of the python-dotenv package are vulnerable to Arbitrary File Overwrite due to unsafe symlink handling in the rewrite() context manager used by set_key() and unset_key() in dotenv/main.py. When the target .env path is a symbolic link and the system temporary directory resides on a different filesystem, shutil.move() falls back to shutil.copy2(), which follows symlinks by default and writes the new content to the symlink target rather than replacing the symlink itself. A local attacker with write access to the directory containing a .env file can pre-place a symlink pointing to any file writable by the process, causing a subsequent call to set_key() or unset_key() to deterministically overwrite the target with attacker-controlled .env content, resulting in integrity loss, Denial of Service, and potential privilege escalation when the consuming process runs with elevated privileges. |
https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/python-3-shield.svg
[](https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/)
.. image:: https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/python-3-shield.svg
:target: https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/
:alt: Python 3
<a href="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/"><img src="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/
{<img src="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/]
https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg
[](https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/)
.. image:: https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg
:target: https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/
:alt: Updates
<a href="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/"><img src="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg(Updates)!:https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/
{<img src="https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/mgarg123/Store_Sales_Prediction/]