PYSEC-2023-108

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/mechanicalsoup/PYSEC-2023-108.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2023-108
Aliases
Published
2023-07-05T20:15:00Z
Modified
2023-11-01T05:02:16.948814Z
Summary
[none]
Details

MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a <input type="file" ...> inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.

References

Affected packages

PyPI / mechanicalsoup

Package

Affected ranges

Type
GIT
Repo
https://github.com/MechanicalSoup/MechanicalSoup
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

0.*

0.0.2
0.0.3
0.1.0
0.1.1
0.1.2
0.2.0
0.2.1
0.2.2
0.3.0
0.3.1
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.9.0
0.9.0.post1
0.9.0.post2
0.9.0.post3
0.9.0.post4
0.10.0
0.11.0
0.12.0

1.*

1.0.0
1.1.0
1.2.0