Vulnerability CVE-2020-11073


Published: 2020-05-13

Description:
In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0

Type:

CWE-74

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Autoswitch python virtualenv project -> Autoswitch python virtualenv 

 References:
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83eca2bc5f6134fccbdc117b49a6a05
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/pull/123
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/security/advisories/GHSA-h8wm-cqq6-957q

Copyright 2022, cxsecurity.com

 

Back to Top