Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12d3A1LXc0cnEtZzRjY84AARlm
Koji blacklisted paths workaround
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission.
Permalink: https://github.com/advisories/GHSA-vwp5-w4rq-g4ccJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12d3A1LXc0cnEtZzRjY84AARlm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 19 hours ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-vwp5-w4rq-g4cc, CVE-2017-1002153
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1002153
- https://pagure.io/koji/issue/563
- https://github.com/pypa/advisory-database/tree/main/vulns/koji/PYSEC-2017-144.yaml
- https://github.com/advisories/GHSA-vwp5-w4rq-g4cc
Affected Packages
pypi:koji
Dependent packages: 12Dependent repositories: 95
Downloads: 29,479 last month
Affected Version Ranges: < 1.15.0
Fixed in: 1.15.0
All affected versions:
All unaffected versions: 1.15.0, 1.16.0, 1.16.1, 1.17.0, 1.18.0, 1.19.0, 1.19.1, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.1, 1.23.0, 1.23.1, 1.24.0, 1.24.1, 1.25.0, 1.25.1, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.31.0, 1.31.1, 1.32.0, 1.32.1, 1.33.0, 1.33.1, 1.33.2, 1.34.0, 1.34.1, 1.34.2, 1.34.3, 1.35.0, 1.35.1