4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
0.001 Low
EPSS
Percentile
30.7%
Stéphane Bruckert
If a malicious URI is passed to the library, the library can be tricked into performing an operation on a different API endpoint than intended.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | py37-spotipy | <= 2.22.0 | UNKNOWN |
FreeBSD | any | noarch | py38-spotipy | <= 2.22.0 | UNKNOWN |
FreeBSD | any | noarch | py39-spotipy | <= 2.22.0 | UNKNOWN |
FreeBSD | any | noarch | py310-spotipy | <= 2.22.0 | UNKNOWN |
FreeBSD | any | noarch | py311-spotipy | <= 2.22.0 | UNKNOWN |
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
0.001 Low
EPSS
Percentile
30.7%