CVE-2022-24065 – cookiecutter
Package
Manager: pip
Name: cookiecutter
Vulnerable Version: >=0 <2.1.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02875 pctl0.85767
Details
OS Command Injection in cookiecutter The package cookiecutter before 2.1.1 is vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Metadata
Created: 2022-06-09T23:48:49Z
Modified: 2024-11-18T16:26:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-f4q6-9qm4-h8j4/GHSA-f4q6-9qm4-h8j4.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-f4q6-9qm4-h8j4
Finding: F404
Auto approve: 1