jsonpath-python is vulnerable to Remote Code Execution (RCE)
95
Critical Risk
Affected versions of this package are vulnerable to Improper Input Validation in the handling of JSONPath filter expressions, where user-controlled input is evaluated without sufficient restrictions. This allows attackers to inject malicious expressions that are executed via eval(), leading to remote code execution. An attacker can exploit this by crafting specially formed JSONPath queries, potentially resulting in arbitrary code execution in the context of the application. The issue is fixed by removing or securing the use of eval() in filter evaluation, preventing execution of untrusted input.
You are affected if you are using a version that falls within the vulnerable range.
jsonpath-python is vulnerable to Remote Code Execution (RCE) in versions 0.0.1 - 1.1.4.
Upgrade the jsonpath-python library to to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant