logo

CVE-2022-31124 openssh-key-parser

Package

Manager: pip
Name: openssh-key-parser
Vulnerable Version: >=0 <0.0.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

EPSS: 0.004 pctl0.59907

Details

Possible leak of key's raw field if declared length is incorrect ### Impact If a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. ### Patches Upgrade to version 0.0.6, which no longer includes the raw field value in the error message. ### Workarounds N/A ### References N/A ### For more information If you have any questions or comments about this advisory: * Open an issue in [openssh_key_parser](https://github.com/scottcwang/openssh_key_parser)

Metadata

Created: 2022-07-06T19:24:12Z
Modified: 2024-10-07T21:17:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-hm37-9xh2-q499/GHSA-hm37-9xh2-q499.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-hm37-9xh2-q499
Finding: F037
Auto approve: 1