Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wbXY5LTN4cXAtOHc0Ms4AA_rJ

Mesop has a local file Inclusion via static file serving functionality

A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served.

Users are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability.

We would like to thank @Letm3through for reporting this issue and proposing mitigations to address this issue.

Permalink: https://github.com/advisories/GHSA-pmv9-3xqp-8w42
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wbXY5LTN4cXAtOHc0Ms4AA_rJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 25 days ago
Updated: 25 days ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-pmv9-3xqp-8w42, CVE-2024-45601
References: Repository: https://github.com/google/mesop
Blast Radius: 1.0

Affected Packages

pypi:mesop
Dependent packages: 0
Dependent repositories: 0
Downloads: 22,721 last month
Affected Version Ranges: >= 0.9.0, < 0.12.4
Fixed in: 0.12.4
All affected versions: 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.10.0, 0.11.0, 0.11.1, 0.12.0, 0.12.1, 0.12.2, 0.12.3
All unaffected versions: 0.0.1, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.5.6, 0.6.0, 0.7.0, 0.7.1, 0.7.2, 0.8.0, 0.12.4, 0.12.5, 0.12.6