CVE-2024-41951 – pheonixappapi
Package
Manager: pip
Name: pheonixappapi
Vulnerable Version: >=0 <0.2.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0004 pctl0.11248
Details
PheonixAppAPI has visible Encoding Maps ### Impact This is a kind of moderate issue. The impact is not big for normal users but can be for users who want to secure their code/files/etc. The issue is that the map of encoding/decoding languages are visible in code. ### Patches The Problem was patched in 0.2.5, so you should try to upgrade to the 0.2.5 version. ### For 0.2.5 version users Please run the post_install.py file inside the Scripts folder after downloading from pip. ### Workarounds There is a fix to this problem but it requires modifying the code. Modifying the code can lead to more issues. ### References There are currently no references to this problem. ### NOTE: If you get a error regarding a function like -> get_key() or something like that, please re-run the file post_install.py inside Scripts folder
Metadata
Created: 2024-07-31T21:04:28Z
Modified: 2024-11-12T19:39:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-258h-f687-4226/GHSA-258h-f687-4226.json
CWE IDs: ["CWE-323"]
Alternative ID: GHSA-258h-f687-4226
Finding: F083
Auto approve: 1