We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56327

Malicious plugin names, recipients, or identities can cause arbitrary binary execution in pyrage



Description

pyrage is a set of Python bindings for the rage file encryption library (age in Rust). `pyrage` uses the Rust `age` crate for its underlying operations, and `age` is vulnerable to GHSA-4fg7-vxc8-qx5w. All details of GHSA-4fg7-vxc8-qx5w are relevant to `pyrage` for the versions specified in this advisory. See GHSA-4fg7-vxc8-qx5w for full details. Versions of `pyrage` before 1.2.0 lack plugin support and are therefore **not affected**. An equivalent issue was fixed in [the reference Go implementation of age](https://github.com/FiloSottile/age), see advisory GHSA-32gq-x56h-299c. This issue has been addressed in version 1.2.3 and all users are advised to update. There are no known workarounds for this vulnerability.

Reserved 2024-12-19 | Published 2024-12-19 | Updated 2024-12-20 | Assigner GitHub_M


HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

>= 1.2.0, < 1.2.3
affected

References

github.com/...pyrage/security/advisories/GHSA-47h8-jmp3-9f28

github.com/...le/age/security/advisories/GHSA-32gq-x56h-299c

github.com/advisories/GHSA-4fg7-vxc8-qx5w

cve.org (CVE-2024-56327)

nvd.nist.gov (CVE-2024-56327)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56327

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.