PyPi: Deepl

CVE-2022-23491

Transitive

Safety vulnerability ID: 65007

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Dec 07, 2022 Updated at Apr 26, 2024
Scan your Python projects for vulnerabilities →

Advisory

Deepl 1.13.0 updates its certifi package from version 2022.9.24 to 2022.12.7 in response to the security issue CVE-2022-23491.
https://github.com/DeepLcom/deepl-python/commit/0e5f71eb26510b2fe0baf17b3d450531918d701c

Affected package

deepl

Latest version: 1.18.0

Python library for the DeepL API.

Affected versions

Fixed versions

Vulnerability changelog

Added
* Add [example script](examples/mustache) to translate Mustache templates.
* Add support for storing your API Key in a keyring via the `keyring` module.
* Added a CI check for copyright headers.
* New languages available: Korean (`'ko'`) and Norwegian (bokmål) (`'nb'`). Add language code constants and tests.

Note: older library versions also support the new languages, this update only adds new code constants.
Fixed
* Copyright headers are updated for 2023
Security
* Update `certifi` to resolve security advisory.
* `certifi` is a development-only dependency; library users are unaffected.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE