GHSA-m7m4-4vm8-55wg

Suggest an improvement
Source
https://github.com/advisories/GHSA-m7m4-4vm8-55wg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-m7m4-4vm8-55wg/GHSA-m7m4-4vm8-55wg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m7m4-4vm8-55wg
Aliases
Published
2022-05-24T17:06:13Z
Modified
2024-10-21T20:26:37.499132Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H CVSS Calculator
  • 7.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
PyAMF vulnerable to XML external entity (XXE)
Details

PyAMF provides Action Message Format (AMF) support for Python that is compatible with the Adobe Flash Player. It includes integration with Python web frameworks like Django, Pylons, Twisted, SQLAlchemy, web2py and more. XML external entity (XXE) vulnerability in PyAMF before 0.8.0 allows remote attackers to cause a denial of service or read arbitrary files via a crafted Action Message Format (AMF) payload.

References

Affected packages

PyPI / pyamf

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.0

Affected versions

0.*

0.4.2
0.5
0.5.1
0.6b2
0.6
0.6.1
0.6.1.1
0.7.0
0.7.1
0.7.2