Path to dependency file: /test/kfp-functional-test/requirements.txt
Path to vulnerable library: /test/kfp-functional-test/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/samples/contrib/azure-samples/kfp-azure-databricks,/contrib/components/openvino/predict/containers/requirements.txt,/samples/core/container_build/requirements.txt,/components/gcp/container/component_sdk/python,/backend/metadata_writer/requirements.txt,/sdk/python,/components/kubeflow/katib-launcher/requirements.txt
Path to dependency file: /test/kfp-functional-test/requirements.txt
Path to vulnerable library: /test/kfp-functional-test/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/samples/contrib/azure-samples/kfp-azure-databricks,/contrib/components/openvino/predict/containers/requirements.txt,/samples/core/container_build/requirements.txt,/components/gcp/container/component_sdk/python,/backend/metadata_writer/requirements.txt,/sdk/python,/components/kubeflow/katib-launcher/requirements.txt
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Vulnerable Library - rsa-4.5-py2.py3-none-any.whl
Pure-Python RSA implementation
Library home page: https://files.pythonhosted.org/packages/26/f8/8127fdda0294f044121d20aac7785feb810e159098447967a6103dedfb96/rsa-4.5-py2.py3-none-any.whl
Path to dependency file: /test/kfp-functional-test/requirements.txt
Path to vulnerable library: /test/kfp-functional-test/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/samples/contrib/azure-samples/kfp-azure-databricks,/contrib/components/openvino/predict/containers/requirements.txt,/samples/core/container_build/requirements.txt,/components/gcp/container/component_sdk/python,/backend/metadata_writer/requirements.txt,/sdk/python,/components/kubeflow/katib-launcher/requirements.txt
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2020-25658
### Vulnerable Library - rsa-4.5-py2.py3-none-any.whlPure-Python RSA implementation
Library home page: https://files.pythonhosted.org/packages/26/f8/8127fdda0294f044121d20aac7785feb810e159098447967a6103dedfb96/rsa-4.5-py2.py3-none-any.whl
Path to dependency file: /test/kfp-functional-test/requirements.txt
Path to vulnerable library: /test/kfp-functional-test/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/samples/contrib/azure-samples/kfp-azure-databricks,/contrib/components/openvino/predict/containers/requirements.txt,/samples/core/container_build/requirements.txt,/components/gcp/container/component_sdk/python,/backend/metadata_writer/requirements.txt,/sdk/python,/components/kubeflow/katib-launcher/requirements.txt
Dependency Hierarchy: - :x: **rsa-4.5-py2.py3-none-any.whl** (Vulnerable Library)
Found in base branch: master
### Vulnerability DetailsIt was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Publish Date: 2020-11-12
URL: CVE-2020-25658
### CVSS 3 Score Details (5.9)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-xrx6-fmxq-rjj2
Release Date: 2020-11-12
Fix Resolution: 4.7
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)