Lucene search

K
githubGitHub Advisory DatabaseGHSA-WQMM-Q65G-2HQR
HistoryMay 01, 2022 - 11:28 p.m.

Paramiko Unsafe randomness usage may allow access to sensitive information

2022-05-0123:28:57
CWE-200
GitHub Advisory Database
github.com
9
paramiko
unsafe randomness
common.py
sensitive information
software

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.007

Percentile

80.2%

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

Affected configurations

Vulners
Node
paramikoparamikoRange1.7.1-2
VendorProductVersionCPE
paramikoparamiko*cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.007

Percentile

80.2%