9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
13 packages
- unstructured-api
- pkgsRocm.unstructured-api
- python312Packages.unstructured-client
- python313Packages.unstructured-client
- python314Packages.unstructured-client
- python312Packages.unstructured-api-tools
- python312Packages.unstructured-inference
- python313Packages.unstructured-api-tools
- python313Packages.unstructured-inference
- python314Packages.unstructured-api-tools
- python314Packages.unstructured-inference
- pkgsRocm.python3Packages.unstructured-inference
- tests.devShellTools.unstructuredDerivationInputEnv
- @LeSuisse dismissed
Unstructured has Path Traversal via Malicious MSG Attachment that Allows Arbitrary File Write
The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.
References
Affected products
- ==< 0.18.18
Matching in nixpkgs
pkgs.python312Packages.unstructured
Open source libraries and APIs to build custom preprocessing pipelines for labeling, training, or production machine learning pipelines
pkgs.python313Packages.unstructured
Open source libraries and APIs to build custom preprocessing pipelines for labeling, training, or production machine learning pipelines
pkgs.python314Packages.unstructured
Open source libraries and APIs to build custom preprocessing pipelines for labeling, training, or production machine learning pipelines
Package maintainers
-
@happysalada Raphael Megzari <raphael@megzari.com>