Lucene search

K
githubGitHub Advisory DatabaseGHSA-CV6J-9835-P7FH
HistoryAug 28, 2022 - 12:00 a.m.

exotel-py 0.1.6 includes code execution backdoor inserted by a third party

2022-08-2800:00:26
GitHub Advisory Database
github.com
9
exotel-py
pypi
code execution
backdoor
downgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.2%

The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem.

Affected configurations

Vulners
Node
exotel_projectexotelMatch0.1.6python
VendorProductVersionCPE
exotel_projectexotel0.1.6cpe:2.3:a:exotel_project:exotel:0.1.6:*:*:*:*:python:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.2%

Related for GHSA-CV6J-9835-P7FH