PyPi: Spotipy

CVE-2023-23608

Safety vulnerability ID: 54942

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jan 26, 2023 Updated at Mar 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Spotipy 2.22.1 includes a fix for CVE-2023-23608: Path traversal vulnerability that may lead to type confusion in URI handling code.
https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v

Affected package

spotipy

Latest version: 2.23.0

A light weight Python library for the Spotify Web API

Affected versions

Fixed versions

Vulnerability changelog

Added

- Add alternative module installation instruction to README
- Added Comment to README - Getting Started for user to add URI to app in Spotify Developer Dashboard.
- Added playlist_add_tracks.py to example folder

Changed

- Modified docstring for playlist_add_items() to accept "only URIs or URLs",
with intended deprecation for IDs in v3

Fixed

- Path traversal vulnerability that may lead to type confusion in URI handling code
- Update contributing.md

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.3

CVSS v3 Details

MEDIUM 4.3
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
LOW
Availability Availability (A)
NONE