In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0
References
Link | Resource |
---|---|
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83eca2bc5f6134fccbdc117b49a6a05 | Patch Third Party Advisory |
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122 | Exploit Third Party Advisory |
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/pull/123 | Third Party Advisory |
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/security/advisories/GHSA-h8wm-cqq6-957q | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-05-13 19:15
Updated : 2021-11-04 17:51
NVD link : CVE-2020-11073
Mitre link : CVE-2020-11073
CVE.ORG link : CVE-2020-11073
JSON object : View
Products Affected
autoswitch_python_virtualenv_project
- autoswitch_python_virtualenv