Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unpin vulnerable urllib3 version #124

Closed

Conversation

SeanPollock
Copy link

Context

The onfido-python generated library has been introducing a vulnerability in my codebase since June 17, as the urllib3 dependency for onfido-python is pinned at < 2.1.0. The vulnerability affects all 2x versions <=2.2.1.

CVE: GHSA-34jh-p97f-mpxf.

I looked through this codebase history and generated the python client lib locally. I don't think the pin to < 2.1.0 was necessary, or are there any breaking changes that affect the client lib generation.

Changes

Remove the < 2.1.0 version pin for urllib3 in the python client generator.

@@ -17,7 +17,7 @@ PYTHON_REQUIRES = ">=3.7"
{{#apis}}
{{#-last}}
REQUIRES = [
"urllib3 >= 1.25.3, < 2.1.0",
"urllib3 >= 1.25.3",
Copy link
Contributor

@dvacca-onfido dvacca-onfido Oct 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@SeanPollock thanks for your contribution.

LGTM, let just add a comment to not forget about this change in case template got refreshed:

Suggested change
"urllib3 >= 1.25.3",
"urllib3 >= 1.25.3", {{! upper bound not needed, < 2.1.0 removed }}

@dvacca-onfido
Copy link
Contributor

dvacca-onfido commented Oct 16, 2024

@SeanPollock thanks for your contribution, anyway I'll close this PR since in #127 we're in the process of upgrading all client libraries to last openapi generator version available (v7.9.0) which includes that change already.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants