
Cloud Vulnerability DB
A community-led vulnerabilities database
The command-line 'safety' package for Python has a potential security vulnerability identified as CVE-2020-5252. The vulnerability was discovered and disclosed in March 2020, affecting all versions up to and including 1.8.6, with version 1.9.0 providing the patch. This vulnerability allows malicious code to bypass the package's security detection routines by disguising or obfuscating other malicious or non-secure packages (GitHub Advisory).
The vulnerability exploits two Python characteristics that enable a 'poison-pill' effect on command-line Safety package detection routines. The issue occurs when Safety is run in an untrusted Python environment or when it's executed from the same environment where dependencies are installed. The vulnerability is considered low severity as it leverages an existing Python condition rather than a flaw in the Safety tool itself (GitHub Advisory).
The vulnerability allows malicious packages to evade detection by the Safety security scanner. This means that potentially dangerous or insecure packages could remain undetected in a Python environment, particularly when dependency packages are being installed arbitrarily or without proper verification (GitHub Advisory).
Several mitigation options are available: 1) Use Docker to perform static analysis by running the Safety Docker image, 2) Run Safety against a static dependencies list in a separate, clean Python environment, 3) Execute Safety from a Continuous Integration pipeline, 4) Use PyUp.io which runs Safety in a controlled environment, or 5) Use PyUp's Online Requirements Checker. The vulnerability has been patched in Safety version 1.9.0 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."