2 results (0.002 seconds)

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 1

Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. • https://github.com/python-poetry/poetry/releases/tag/1.1.9 https://github.com/python-poetry/poetry/releases/tag/1.2.0b1 https://github.com/python-poetry/poetry/security/advisories/GHSA-9xgj-fcgf-x6mw https://www.sonarsource.com/blog/securing-developer-tools-package-managers • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.3EPSS: 0%CPEs: 4EXPL: 0

Poetry is a dependency manager for Python. To handle dependencies that come from a Git repository, Poetry executes various commands, e.g. `git config`. These commands are being executed using the executable’s name and not its absolute path. This can lead to the execution of untrusted code due to the way Windows resolves executable names to paths. • https://github.com/python-poetry/poetry/releases/tag/1.1.9 https://github.com/python-poetry/poetry/releases/tag/1.2.0b1 https://github.com/python-poetry/poetry/security/advisories/GHSA-j4j9-7hg9-97g6 • CWE-426: Untrusted Search Path •