Source: python-mechanicalsoup
Version: 0.10.0-6
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 0.10.0-4

Hi,

The following vulnerability was published for python-mechanicalsoup.

The severity choosen for the bugreport might be slightly overrated,
but I am aiming to understand if the package is actively maintained
and might rather be removed from testing if not updated to a more
recent version.

CVE-2023-34457[0]:
| MechanicalSoup is a Python library for automating interaction with
| websites. Starting in version 0.2.0 and prior to version 1.3.0, a
| malicious web server can read arbitrary files on the client using a
| `<input type="file" ...>` inside HTML form. All users of
| MechanicalSoup's form submission are affected, unless they took very
| specific (and manual) steps to reset HTML form field values. Version
| 1.3.0 contains a patch for this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-34457
    https://www.cve.org/CVERecord?id=CVE-2023-34457
[1] 
https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4
[2] 
https://github.com/MechanicalSoup/MechanicalSoup/commit/d57c4a269bba3b9a0c5bfa20292955b849006d9e

Regards,
Salvatore

Reply via email to