All the vulnerabilites related to Avaiga - taipy
cve-2024-47833
Vulnerability from cvelistv5
Published
2024-10-09 18:25
Modified
2024-10-09 19:55
Severity ?
EPSS score ?
Summary
Session Cookie without Secure and HTTPOnly flags in taipy
References
▼ | URL | Tags |
---|---|---|
https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "taipy", "vendor": "avaiga", "versions": [ { "lessThan": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47833", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:51:41.486824Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:55:10.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "taipy", "vendor": "Avaiga", "versions": [ { "status": "affected", "version": "\u003c 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 6.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614: Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1004", "description": "CWE-1004: Sensitive Cookie Without \u0027HttpOnly\u0027 Flag", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T18:25:02.563Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp" } ], "source": { "advisory": "GHSA-r3jq-4r5c-j9hp", "discovery": "UNKNOWN" }, "title": "Session Cookie without Secure and HTTPOnly flags in taipy" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47833", "datePublished": "2024-10-09T18:25:02.563Z", "dateReserved": "2024-10-03T14:06:12.643Z", "dateUpdated": "2024-10-09T19:55:10.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }