-
CVSS Score
-The vulnerability stems from missing cumulative metadata validation in DatabaseBroker.update_metadata. The function was called by account/container handlers without proper validation, allowing attackers to split metadata across requests. The patches added a validate_metadata parameter and validation checks, confirming these were the vulnerable points. Code diffs show the addition of validation logic and the enabling of validation in calling functions, demonstrating the original lack of proper constraint enforcement.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| swift | pip | < 2.2.0 | 2.2.0 |
A Semantic Attack on Google Gemini - Read the Latest Research