Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqmm-q65g-2hqr

Опубликовано: 01 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

Paramiko Unsafe randomness usage may allow access to sensitive information

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

Пакеты

Наименование

paramiko

pip
Затронутые версииВерсия исправления

<= 1.7.1-2

1.7.1-3

EPSS

Процентиль: 78%
0.01232
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

redhat
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

nvd
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

debian
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked ...

EPSS

Процентиль: 78%
0.01232
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-200