PYSEC-2020-264

Vulnerability from pysec - Published: 2020-07-27 18:15 - Updated: 2021-11-16 03:58
VLAI?
Details

In "I hate money" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. This is fixed in version 4.1.5.

Impacted products
Name purl
ihatemoney pkg:pypi/ihatemoney

{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "ihatemoney",
        "purl": "pkg:pypi/ihatemoney"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8d77cf5d5646e1d2d8ded13f0660638f57e98471"
            }
          ],
          "repo": "https://github.com/spiral-project/ihatemoney",
          "type": "GIT"
        },
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.1.5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "versions": [
        "1.0",
        "2.0",
        "2.1",
        "3.0",
        "4.0",
        "4.1",
        "4.1.2",
        "4.1.3",
        "4.1.4"
      ]
    }
  ],
  "aliases": [
    "CVE-2020-15120",
    "GHSA-67j9-c52g-w2q9"
  ],
  "details": "In \"I hate money\" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project\u0027s private code. This can be further exploited to access all bills of another project without knowledge of this other project\u0027s private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. This is fixed in version 4.1.5.",
  "id": "PYSEC-2020-264",
  "modified": "2021-11-16T03:58:44.236145Z",
  "published": "2020-07-27T18:15:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9"
    },
    {
      "type": "FIX",
      "url": "https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…