Source: python-mechanicalsoup Version: 0.10.0-6 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 0.10.0-4
Hi, The following vulnerability was published for python-mechanicalsoup. The severity choosen for the bugreport might be slightly overrated, but I am aiming to understand if the package is actively maintained and might rather be removed from testing if not updated to a more recent version. CVE-2023-34457[0]: | MechanicalSoup is a Python library for automating interaction with | websites. Starting in version 0.2.0 and prior to version 1.3.0, a | malicious web server can read arbitrary files on the client using a | `<input type="file" ...>` inside HTML form. All users of | MechanicalSoup's form submission are affected, unless they took very | specific (and manual) steps to reset HTML form field values. Version | 1.3.0 contains a patch for this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-34457 https://www.cve.org/CVERecord?id=CVE-2023-34457 [1] https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4 [2] https://github.com/MechanicalSoup/MechanicalSoup/commit/d57c4a269bba3b9a0c5bfa20292955b849006d9e Regards, Salvatore