Skip to content

[GHSA-xqrq-4mgf-ff32] Python-Future Module Arbitrary Code Execution via Unintended Import of test.py #6036

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: BarrensZeppelin/advisory-improvement-6036
Choose a base branch
from

Conversation

BarrensZeppelin
Copy link

Updates

  • Affected products
  • CVSS v4

Comments
The vulnerability affects more than just the single version in the original report.
I tested the PoC on a number of versions to find the lowest affected version (0.14.0).

@Copilot Copilot AI review requested due to automatic review settings August 20, 2025 11:21
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates a security advisory (GHSA-xqrq-4mgf-ff32) for the Python-Future module to reflect broader impact than originally reported. The update corrects the CVSS v4 score and expands the affected versions from a single version (1.0.0) to all versions starting from 0.14.0.

Key changes:

  • Updated CVSS v4 score by removing the exploitability metric
  • Expanded affected versions from single version to version range starting at 0.14.0
  • Updated modification timestamp

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

@@ -11,7 +11,7 @@
"severity": [
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
Copy link
Preview

Copilot AI Aug 20, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The CVSS v4 score appears to be missing the exploitability metric (E:) that was present in the original score. If the vulnerability has proven exploitability, the E:P (Proof-of-concept) metric should be retained to accurately reflect the threat level.

Suggested change
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"

Copilot uses AI. Check for mistakes.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, I did not intend to remove that metric. I don't know why it happened.

@github-actions github-actions bot changed the base branch from main to BarrensZeppelin/advisory-improvement-6036 August 20, 2025 11:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant