PyPi: Pact-Python

CVE-2007-4559

Safety vulnerability ID: 53381

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Aug 28, 2007 Updated at Apr 11, 2024
Scan your Python projects for vulnerabilities →

Advisory

Pact-python 1.7.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.

Affected package

pact-python

Latest version: 2.2.0

Tool for creating and verifying consumer-driven contracts using the Pact framework.

Affected versions

Fixed versions

Vulnerability changelog

* 9c1132e - Merge pull request 325 from pact-foundation/pactflow_camelcase (Yousaf Nabi, Fri Jan 27 12:29:59 2023 +0000)
* 44cda33 - chore: /s/Pactflow/PactFlow (Yousaf Nabi, Thu Jan 26 16:11:54 2023 +0000)
* 1bbdd37 - feat: Enhance provider states for pact-message (322) (nsfrias, Tue Jan 24 17:04:29 2023 +0000)
* 53ca129 - chore: add workflow to create a jira issue for pactflow team when smartbear-supported label added to github issue (Beth Skurrie, Wed Jan 18 10:51:05 2023 +1100)
* d87d54b - fix: setup security issue (318) (Elliott Murray, Mon Nov 21 09:39:41 2022 +0000)
* 55f2a64 - fix: requirements_dev.txt to reduce vulnerabilities (317) (Matt Fellows, Sun Nov 6 02:12:30 2022 +1100)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.8

CVSS v2 Details

MEDIUM 6.8
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL