CodeChung / codechung

0 stars 0 forks source link

CVE-2020-13757 (High) detected in rsa-3.4.2.tar.gz #50

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2020-13757 - High Severity Vulnerability

Vulnerable Library - rsa-3.4.2.tar.gz

Pure-Python RSA implementation

Library home page: https://files.pythonhosted.org/packages/14/89/adf8b72371e37f3ca69c6cb8ab6319d009c4a24b04a31399e5bd77d9bb57/rsa-3.4.2.tar.gz

Path to vulnerable library: /awscli-bundle/awscli-bundle/packages/rsa-3.4.2.tar.gz,/awscli-bundle/packages/rsa-3.4.2.tar.gz

Dependency Hierarchy: - :x: **rsa-3.4.2.tar.gz** (Vulnerable Library)

Found in HEAD commit: de1c2b0d1a23367b161c2d995029f9693bd8a155

Found in base branch: master

Vulnerability Details

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).

Publish Date: 2020-06-01

URL: CVE-2020-13757

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-06-01

Fix Resolution: 4.1


Step up your Open Source Security Game with Mend here