安全漏洞|pip-audit:功能强大的安全漏洞扫描工具( 三 )



----  ------- -------------- ------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Flask 0.5     PYSEC-2019-179 1.0          The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1\\. NOTE: this may overlap CVE-2018-1000656.

Flask 0.5     PYSEC-2018-66  0.12.3       The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3\\. NOTE: this may overlap CVE-2019-1010083.

审计JSON格式依赖:
$ pip-audit -f json | jq

Found 2 known vulnerabilities in 1 package

[

  {

    \"name\": \"flask\"

    \"version\": \"0.5\"

    \"vulns\": [

      {

        \"id\": \"PYSEC-2019-179\"

        \"fix_versions\": [

          \"1.0\"

        


        \"description\": \"The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1\\. NOTE: this may overlap CVE-2018-1000656.\"

      

      {

        \"id\": \"PYSEC-2018-66\"

        \"fix_versions\": [

          \"0.12.3\"

        


        \"description\": \"The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3\\. NOTE: this may overlap CVE-2019-1010083.\"

      

    


  

  {

    \"name\": \"jinja2\"

    \"version\": \"3.0.2\"

    \"vulns\": [


  

  {

    \"name\": \"pip\"

    \"version\": \"21.3.1\"

    \"vulns\": [


  

  {

    \"name\": \"setuptools\"

    \"version\": \"57.4.0\"

    \"vulns\": [


  

  {

    \"name\": \"werkzeug\"

    \"version\": \"2.0.2\"

    \"vulns\": [


  

  {

    \"name\": \"markupsafe\"

    \"version\": \"2.0.1\"

    \"vulns\": [


  





【一>所有资源关注我 , 私信回复\"资料\"获取<一】
1、网络安全学习路线
2、电子书籍(白帽子)
3、安全大厂内部视频
4、100份src文档
5、常见安全面试题
6、ctf大赛经典题目解析
7、全套工具包
8、应急响应笔记
审计并尝试自动审计存在漏洞的依赖:
$ pip-audit --fix

Found 2 known vulnerabilities in 1 package and fixed 2 vulnerabilities in 1 package

Name  Version ID             Fix Versions Applied Fix

----- ------- -------------- ------------ ----------------------------------------

flask 0.5     PYSEC-2019-179 1.0          Successfully upgraded flask (0.5 => 1.0)

flask 0.5     PYSEC-2018-66  0.12.3       Successfully upgraded flask (0.5 => 1.0)