Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyrage
  4. ›
  5. GHSA-47h8-jmp3-9f28

GHSA-47h8-jmp3-9f28: pyrage vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution

December 19, 2024

pyrage uses the Rust age crate for its underlying operations, and age is vulnerable to GHSA-4fg7-vxc8-qx5w.

All details of GHSA-4fg7-vxc8-qx5w are relevant to pyrage for the versions specified in this advisory. See GHSA-4fg7-vxc8-qx5w for full details.

Versions of pyrage before 1.2.0 lack plugin support and are therefore not affected.

An equivalent issue was fixed in the reference Go implementation of age, see advisory GHSA-32gq-x56h-299c.

Thanks to ⬡-49016 for reporting this issue.

References

  • github.com/FiloSottile/age/security/advisories/GHSA-32gq-x56h-299c
  • github.com/advisories/GHSA-47h8-jmp3-9f28
  • github.com/str4d/rage/security/advisories/GHSA-4fg7-vxc8-qx5w
  • github.com/woodruffw/pyrage
  • github.com/woodruffw/pyrage/security/advisories/GHSA-47h8-jmp3-9f28

Code Behaviors & Features

Detect and mitigate GHSA-47h8-jmp3-9f28 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.2.0 before 1.2.3

Fixed versions

  • 1.2.3

Solution

Upgrade to version 1.2.3 or above.

Weakness

  • CWE-1395: Dependency on Vulnerable Third-Party Component
  • CWE-25: Path Traversal: '/../filedir'

Source file

pypi/pyrage/GHSA-47h8-jmp3-9f28.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:01 +0000.