Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyrage
  4. ›
  5. CVE-2024-56327

CVE-2024-56327: pyrage vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution

December 19, 2024 (updated December 20, 2024)

pyrage uses the Rust age crate for its underlying operations, and age is vulnerable to GHSA-4fg7-vxc8-qx5w.

All details of GHSA-4fg7-vxc8-qx5w are relevant to pyrage for the versions specified in this advisory. See GHSA-4fg7-vxc8-qx5w for full details.

Versions of pyrage before 1.2.0 lack plugin support and are therefore not affected.

An equivalent issue was fixed in the reference Go implementation of age, see advisory GHSA-32gq-x56h-299c.

Thanks to ⬡-49016 for reporting this issue.

References

  • github.com/FiloSottile/age/security/advisories/GHSA-32gq-x56h-299c
  • github.com/advisories/GHSA-47h8-jmp3-9f28
  • github.com/advisories/GHSA-4fg7-vxc8-qx5w
  • github.com/str4d/rage/security/advisories/GHSA-4fg7-vxc8-qx5w
  • github.com/woodruffw/pyrage
  • github.com/woodruffw/pyrage/security/advisories/GHSA-47h8-jmp3-9f28
  • nvd.nist.gov/vuln/detail/CVE-2024-56327

Code Behaviors & Features

Detect and mitigate CVE-2024-56327 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.2.0 before 1.2.3

Fixed versions

  • 1.2.3

Solution

Upgrade to version 1.2.3 or above.

Weakness

  • CWE-1395: Dependency on Vulnerable Third-Party Component
  • CWE-25: Path Traversal: '/../filedir'
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

pypi/pyrage/CVE-2024-56327.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:07 +0000.