
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity security vulnerability was identified in docassemble (pip package) affecting versions prior to 1.2.65. The vulnerability, tracked as GHSA-qrmm-w4v4-q7f8, was discovered by Jim Platania of Seiso LLC and was published on May 5, 2021. The issue relates to unauthorized access through URL manipulation and is classified under CWE-552 (GitHub Advisory).
The vulnerability is categorized as CWE-552 and has been assessed as High severity. The issue specifically involves unauthorized access capabilities through URL manipulation in the docassemble system (GitHub Advisory).
The vulnerability enables attackers to gain unauthorized access to information on the system through URL manipulation techniques (GitHub Advisory).
The vulnerability has been patched in multiple versions: version 1.2.65 of the master branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the stable branch. The Docker image on docker.io has also been updated. For systems unable to upgrade immediately, a manual workaround is available by applying the changes from commit e3dbf6c and restarting the server through the Configuration screen (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."