GHSA-rf3f-3p37-2qh4

Suggest an improvement
Source
https://github.com/advisories/GHSA-rf3f-3p37-2qh4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-rf3f-3p37-2qh4/GHSA-rf3f-3p37-2qh4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-rf3f-3p37-2qh4
Aliases
Published
2022-09-02T00:01:08Z
Modified
2024-11-26T19:25:06.980655Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 9.1 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
python-scciclient vulnerable to Man-in-the-middle (MITM) attacks
Details

A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.

Database specific
{
    "nvd_published_at": "2022-09-01T18:15:00Z",
    "cwe_ids": [
        "CWE-295"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-09-16T18:34:47Z"
}
References

Affected packages

PyPI / python-scciclient

Package

Name
python-scciclient
View open source insights on deps.dev
Purl
pkg:pypi/python-scciclient

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.12.0

Affected versions

0.*

0.0.1
0.1.0
0.2.0
0.3.0
0.3.1
0.4.0
0.5.0
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.8.0
0.8.1
0.8.2.dev1
0.8.2
0.8.3.dev1
0.8.3
0.9.0
0.9.1
0.9.2.dev1
0.9.2.dev3
0.9.2
0.9.3
0.9.4
0.9.5
0.10.0
0.10.1
0.10.2
0.11.0.dev1
0.11.1
0.11.2
0.11.3
0.11.4