-
Notifications
You must be signed in to change notification settings - Fork 2
Description
Vulnerable Library - pycryptodome-3.19.0-cp35-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Cryptographic library for Python
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Found in HEAD commit: 46b2b180777accd8b00c59f7f7b3dae4eeecfed2
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (pycryptodome version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2023-52323 | 5.9 | pycryptodome-3.19.0-cp35-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl | Direct | pycryptodomex - 3.19.1 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-52323
Vulnerable Library - pycryptodome-3.19.0-cp35-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Cryptographic library for Python
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- ❌ pycryptodome-3.19.0-cp35-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Vulnerable Library)
Found in HEAD commit: 46b2b180777accd8b00c59f7f7b3dae4eeecfed2
Found in base branch: main
Vulnerability Details
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
Publish Date: 2024-01-05
URL: CVE-2023-52323
CVSS 3 Score Details (5.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-52323
Release Date: 2024-01-05
Fix Resolution: pycryptodomex - 3.19.1
Step up your Open Source Security Game with Mend here