Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: poetryPlugins.poetry-audit-plugin

Found 1 matching suggestions

View:
Compact
Detailed
created 2 weeks, 1 day ago
Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write

Poetry is a dependency manager for Python. From version 1.4.0 to before version 2.3.3, a crafted wheel can contain ../ paths that Poetry writes to disk without containment checks, allowing arbitrary file write with the privileges of the Poetry process. It is reachable from untrusted package artifacts during normal install flows. (Normally, installing a malicious wheel is not sufficient for execution of malicious code. Malicious code will only be executed after installation if the malicious package is imported or invoked by the user.). This issue has been patched in version 2.3.3.

Affected products

poetry
  • ==>= 1.4.0, < 2.3.3

Matching in nixpkgs

pkgs.poetry

Python dependency management and packaging made easy

pkgs.poetry2conda

Script to convert a Python project declared on a pyproject.toml to a conda environment

pkgs.poetryPlugins.poetry-plugin-poeblix

Poetry Plugin that adds various features that extend the poetry command such as building wheel files with locked dependencies, and validations of wheel/docker containers

Package maintainers