
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-39229 is a security vulnerability affecting the IFTTT plugin in the Apprise library versions 0.9.4 and earlier. The vulnerability was discovered and disclosed on September 20, 2021, and involves a regex injection issue that could potentially impact systems where Apprise library is publicly hosted with access to IFTTT notification services (GitHub Advisory).
The vulnerability is classified under CWE-400 and CWE-730 (Regex Injection). The issue specifically affects the IFTTT plugin implementation within the Apprise library, where improper handling of regular expressions could potentially be exploited (GitHub Advisory).
The vulnerability affects systems where Apprise library is publicly hosted and granted access to the IFTTT notification service. The specific impact details were rated as Low severity according to the official advisory (GitHub Advisory).
The vulnerability was patched in Apprise version 0.9.5.1. Users can mitigate the issue by either upgrading to the patched version using 'pip install apprise==0.9.5.1' or, alternatively, by removing the file 'apprise/plugins/NotifyIFTTT.py' if upgrading is not an option. Note that removing the file will eliminate IFTTT functionality while maintaining other features (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."