5
CVSSv2

CVE-2019-6690

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

python-gnupg 0.4.3 allows context-dependent malicious users to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python-gnupg 0.4.3

debian debian linux 8.0

debian debian linux 9.0

opensuse leap 15.0

suse backports -

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 19.04

Vendor Advisories

Several security issues were fixed in python-gnupg ...

Github Repositories

CVE-2019-6690: Improper Input Validation in python-gnupg 043 We discovered a way to inject data trough the passphrase property of the gnupgGPGencrypt() and gnupgGPGdecrypt() methods when symmetric encryption is used The supplied passphrase is not validated for newlines, and the library passes --passphrase-fd=0 to the gpg executable, which expects the passphrase on the fi

It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).

Summary It is a simple PoC of Improper Input Validation in python-gnupg 043 (CVE-2019-6690) Vulnerable python python-gnupg 043 python python-gnupg 036 python python-gnupg 035 python python-gnupg 034 Mitigation Users should upgrade to 044 Test Environment Docker Image docker pull avfisherdocker/python-gnupg043:CVE-2019-6690 docker run -d -p 5000:5000 avfisherdo

CVE-2019-6690: Improper Input Validation in python-gnupg 043 We discovered a way to inject data trough the passphrase property of the gnupgGPGencrypt() and gnupgGPGdecrypt() methods when symmetric encryption is used The supplied passphrase is not validated for newlines, and the library passes --passphrase-fd=0 to the gpg executable, which expects the passphrase on the fi