Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/354651?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354651?format=api", "vulnerability_id": "VCID-4tn4-pbvn-h3hx", "summary": "GitPython has Command Injection via Git options bypass", "aliases": [ { "alias": "GHSA-rpm5-65cw-6hj4" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077782?format=api", "purl": "pkg:pypi/gitpython@3.1.47", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/gitpython@3.1.47" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/30405?format=api", "purl": "pkg:pypi/gitpython@3.1.30", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-16je-k2yd-jydf" }, { "vulnerability": "VCID-43fr-z5nf-cqax" }, { "vulnerability": "VCID-4tn4-pbvn-h3hx" }, { "vulnerability": "VCID-qf8a-r6sz-qqf7" }, { "vulnerability": "VCID-y786-mwkd-u7ha" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/gitpython@3.1.30" } ], "references": [ { "reference_url": "https://github.com/advisories/GHSA-rpm5-65cw-6hj4", "reference_id": "GHSA-rpm5-65cw-6hj4", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-rpm5-65cw-6hj4" }, { "reference_url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-65cw-6hj4", "reference_id": "GHSA-rpm5-65cw-6hj4", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-65cw-6hj4" } ], "weaknesses": [ { "cwe_id": 78, "name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "description": "The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tn4-pbvn-h3hx" }