Description
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Exploits (2)
nomisec
WORKING POC
1 stars
by stigtsp · poc
https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability
References (13)
Scores
CVSS v3
7.5
EPSS
0.2143
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Lab Environment
Details
CWE
CWE-20
Status
published
Products (9)
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
canonical/ubuntu_linux
19.04
debian/debian_linux
8.0
debian/debian_linux
9.0
opensuse/leap
15.0
pypi/python-gnupg
0 - 0.4.4PyPI
python/python-gnupg
0.4.3
suse/backports
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026