ozblumen / UdmTestMaven

0 stars 0 forks source link

oauth2client-1.3.zip: 3 vulnerabilities (highest severity is: 7.5) - autoclosed #11

Closed dev-mend-for-github-com[bot] closed 2 years ago

dev-mend-for-github-com[bot] commented 2 years ago
Vulnerable Library - oauth2client-1.3.zip

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Found in HEAD commit: cec76f9cb1f1f247a8a869257240735ac869be70

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2020-13757 High 7.5 rsa-3.1.4.tar.gz Transitive 1.3.2
CVE-2020-25658 Medium 5.9 rsa-3.1.4.tar.gz Transitive 1.3.2
WS-2012-0012 Medium 4.0 rsa-3.1.4.tar.gz Transitive 1.3.2

Details

CVE-2020-13757 ### Vulnerable Library - rsa-3.1.4.tar.gz

Pure-Python RSA implementation

Library home page: https://files.pythonhosted.org/packages/db/65/01448b2f3e222a846cbe7a62ea61950c5659b1f9489171eb68242415f92c/rsa-3.1.4.tar.gz

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - oauth2client-1.3.zip (Root Library) - :x: **rsa-3.1.4.tar.gz** (Vulnerable Library)

Found in HEAD commit: cec76f9cb1f1f247a8a869257240735ac869be70

Found in base branch: main

### Vulnerability Details

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).

Publish Date: 2020-06-01

URL: CVE-2020-13757

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2020-09-02

Fix Resolution (rsa): 4.1

Direct dependency fix Resolution (oauth2client): 1.3.2

:rescue_worker_helmet: Automatic Remediation is available for this issue
CVE-2020-25658 ### Vulnerable Library - rsa-3.1.4.tar.gz

Pure-Python RSA implementation

Library home page: https://files.pythonhosted.org/packages/db/65/01448b2f3e222a846cbe7a62ea61950c5659b1f9489171eb68242415f92c/rsa-3.1.4.tar.gz

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - oauth2client-1.3.zip (Root Library) - :x: **rsa-3.1.4.tar.gz** (Vulnerable Library)

Found in HEAD commit: cec76f9cb1f1f247a8a869257240735ac869be70

Found in base branch: main

### Vulnerability Details

It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.

Publish Date: 2020-11-12

URL: CVE-2020-25658

### CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-xrx6-fmxq-rjj2

Release Date: 2020-11-12

Fix Resolution (rsa): 4.7

Direct dependency fix Resolution (oauth2client): 1.3.2

:rescue_worker_helmet: Automatic Remediation is available for this issue
WS-2012-0012 ### Vulnerable Library - rsa-3.1.4.tar.gz

Pure-Python RSA implementation

Library home page: https://files.pythonhosted.org/packages/db/65/01448b2f3e222a846cbe7a62ea61950c5659b1f9489171eb68242415f92c/rsa-3.1.4.tar.gz

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - oauth2client-1.3.zip (Root Library) - :x: **rsa-3.1.4.tar.gz** (Vulnerable Library)

Found in HEAD commit: cec76f9cb1f1f247a8a869257240735ac869be70

Found in base branch: main

### Vulnerability Details

There is a security vulnerability in python-rsa before version 3.4. Depending on the way decrypt_bigfile() is called, it may be possible to do a Bleichenbacher attack.

Publish Date: 2016-01-22

URL: WS-2012-0012

### CVSS 3 Score Details (4.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2016-01-22

Fix Resolution (rsa): 3.4

Direct dependency fix Resolution (oauth2client): 1.3.2

:rescue_worker_helmet: Automatic Remediation is available for this issue

:rescue_worker_helmet: Automatic Remediation is available for this issue.

dev-mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.