CVE-2021-39229 – apprise
Package
Manager: pip
Name: apprise
Vulnerable Version: >=0 <0.9.5.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00446 pctl0.62565
Details
Apprise vulnerable to regex injection with IFTTT Plugin ### Impact Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service. ### Patches Update to Apprise v0.9.5.1 ```bash # Install Apprise v0.9.5.1 from PyPI pip install apprise==0.9.5.1 ``` The patch to the problem was performed [here](https://github.com/caronc/apprise/pull/436/files). ### Workarounds Alternatively, if upgrading is not an option, you can safely remove the following file: - `apprise/plugins/NotifyIFTTT.py` The above will eliminate the ability to use IFTTT, but everything else will work smoothly. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Apprise](https://github.com/caronc/apprise/issues) * Email me at [lead2gold@gmail.com](mailto:lead2gold@gmail.com) ### Additional Credit Github would not allow me to additionally credit **Rasmus Petersen**, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited ## Additional Notes: - Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)
Metadata
Created: 2021-09-20T20:57:02Z
Modified: 2024-09-12T20:54:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-qhmp-h54x-38qr/GHSA-qhmp-h54x-38qr.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-qhmp-h54x-38qr
Finding: F067
Auto approve: 1