You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
CVE-2020-13757 - High Severity Vulnerability
Vulnerable Library - rsa-4.0-py2.py3-none-any.whl
Pure-Python RSA implementation
Library home page: https://files.pythonhosted.org/packages/02/e5/38518af393f7c214357079ce67a317307936896e961e35450b70fad2a9cf/rsa-4.0-py2.py3-none-any.whl
Path to dependency file: /tmp/ws-scm/thin-egress-app/lambda/requirements.txt
Path to vulnerable library: /tmp/ws-scm/thin-egress-app/lambda/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 7a7150830e3c44c9d03bac1e685c163285f1c218
Vulnerability Details
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
Publish Date: 2020-06-01
URL: CVE-2020-13757
CVSS 3 Score Details (7.5)
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: