7.9 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
0.001 Low
EPSS
Percentile
45.4%
In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious .venv
file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0
[
{
"product": "zsh-autoswitch-virtualenv",
"vendor": "MichaelAquilina",
"versions": [
{
"status": "affected",
"version": "< 0.16.0"
}
]
}
]
github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83eca2bc5f6134fccbdc117b49a6a05
github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122
github.com/MichaelAquilina/zsh-autoswitch-virtualenv/pull/123
github.com/MichaelAquilina/zsh-autoswitch-virtualenv/security/advisories/GHSA-h8wm-cqq6-957q