VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
355
CVE-2014-0105
Python-keystoneclient before 0.7.0 allows authenticated remote users to gain privileges via a memcache-related issue

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
354
CVE-2019-14853
Python-ecdsa < 0.13.3: Flaw in handling malformed DER signatures can lead to denial of service

An error-handling flaw was found in python-ecdsa before version 0.13.3. During signature decoding, malformed DER signatures could raise unexpected exceptions (or no exceptions at all), which could lead to a denial of service.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
353
CVE-2020-5252
Low-severity Python "safety" package vulnerability disguises packages

The command-line "safety" package for Python has a potential security issue. There are two Python characteristics that allow malicious code to โ€œpoison-pillโ€ command-line Safety package detection routines by disguising, or obfuscating, other malicious or non-secure packages. This vulnerability is considered to be of low severity because the attack makes use of an existing Python condition, not the Safety tool itself. This can happen if: You are running Safety in a Python environment that you donโ€™t trust. You are running Safety from the same Python environment where you have your dependencies installed. Dependency packages are being installed arbitrarily or without proper verification. Users can mitigate this issue by doing any of the following: Perform a static analysis by installing Docker and running the Safety Docker image: $ docker run --rm -it pyupio/safety check -r requirements.txt Run Safety against a static dependencies list, such as the requirements.txt file, in a separate, clean Python environment. Run Safety from a Continuous Integration pipeline. Use PyUp.io, which runs Safety in a controlled environment and checks Python for dependencies without any need to install them. Use PyUp's Online Requirements Checker.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
349
CVE-2019-13611
Python-engineio (through 3.8.2) allows WebSocket hijacking via unrestricted Origin headers

An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
348
CVE-2021-46823
Python-ldap < 3.4.0 vulnerable to ReDoS in LDAP schema parser

python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
345
CVE-2019-14859
Python-ecdsa < 0.13.3 accepted malformed signatures, enabling false transactions

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.

Checking
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
341
CVE-2009-3724
python-markdown2 before 1.0.1.14 has multiple XSS vulnerabilities

python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
340
CVE-2013-6396
Python-swiftclient 1.0 to 1.9.0: SSL certificate spoofing due to no verification

The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
338
CVE-2017-0906
Recurly Python Library SSRF API compromise risk

The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.

Function
Configuration Issues
Server-Side Request Forgery (SSRF)
Remote
335
CVE-2023-40590
Vulnerable GitPython on Windows: Malicious git executable in repository allows command execution. Mitigation needed

GitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::