Arbitrary Code Execution via Malicious .venv File in Autoswitch Python Virtualenv

Arbitrary Code Execution via Malicious .venv File in Autoswitch Python Virtualenv

CVE-2020-11073 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0

Learn more about our User Device Pen Test.