Lucene search

K
githubGitHub Advisory DatabaseGHSA-MHHF-VGWH-FW9H
HistoryDec 06, 2022 - 9:13 p.m.

Passeo uses insecure random number generator

2022-12-0621:13:32
CWE-338
GitHub Advisory Database
github.com
31
passeo
insecure random number generator
confidentiality
password
v1.0.5
secrets library
update

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.3%

Impact

Everyone below v1.0.5 is impacted by this flaw, of confidentiality being at risk due to the password(s) being easily able to be guessed with Passeo’s use of the random library. It is recommended to change any passwords made with Passeo before v1.0.5 and upgrade to v1.0.5, and v1.0.5 patches this with the secrets library.

Workarounds

No current workaround available than updating to v1.0.5.

Affected configurations

Vulners
Node
passeo_projectpasseoRange<1.0.5python
VendorProductVersionCPE
passeo_projectpasseo*cpe:2.3:a:passeo_project:passeo:*:*:*:*:*:python:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.3%

Related for GHSA-MHHF-VGWH-FW9H