Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12dmp2LTk3ajgtOTR4aM4AAx3p
vantage6 vulnerable to Improper Preservation of Permissions
Impact
Assigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access.
Patches
Update to 3.8.0
Workarounds
None
References
None
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12dmp2LTk3ajgtOTR4aM4AAx3p
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-vvjv-97j8-94xh, CVE-2023-22738
References:
- https://github.com/vantage6/vantage6/security/advisories/GHSA-vvjv-97j8-94xh
- https://github.com/vantage6/vantage6/commit/798aca1de142a4eca175ef51112e2235642f4f24
- https://nvd.nist.gov/vuln/detail/CVE-2023-22738
- https://github.com/advisories/GHSA-vvjv-97j8-94xh
Blast Radius: 6.2
Affected Packages
pypi:vantage6
Dependent packages: 2Dependent repositories: 9
Downloads: 1,820 last month
Affected Version Ranges: < 3.8.0
Fixed in: 3.8.0
All affected versions: 0.0.0, 1.0.0, 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 2.0.0, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.10, 2.2.11, 2.2.12, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.1.0, 3.2.0, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1, 3.5.2, 3.6.0, 3.6.1, 3.7.0, 3.7.1, 3.7.2, 3.7.3
All unaffected versions: 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.9.0, 3.10.0, 3.10.1, 3.10.3, 3.10.4, 3.11.0, 3.11.1, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1, 4.3.2, 4.3.4