PYSEC-2022-43134

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/exotel/PYSEC-2022-43134.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2022-43134
Aliases
Published
2022-08-27T20:15:00Z
Modified
2024-11-25T22:42:25.503499Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party.

References

Affected packages

PyPI / exotel

Package

Affected ranges

Affected versions

0.*

0.1.6