Source: lookatme
Version: 1.2.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for lookatme.

CVE-2020-15271[0]:
| In lookatme (python/pypi package) versions prior to 2.3.0, the package
| automatically loaded the built-in "terminal" and "file_loader"
| extensions. Users that use lookatme to render untrusted markdown may
| have malicious shell commands automatically run on their system. This
| is fixed in version 2.3.0. As a workaround, the
| `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py`
| files may be manually deleted. Additionally, it is always recommended
| to be aware of what is being rendered with lookatme.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15271
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15271
[1] 
https://github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q
[2] 
https://github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84
[3] https://github.com/d0c-s4vage/lookatme/pull/110

Regards,
Salvatore

Reply via email to