CVE-2019-6690

HIGH

Python-gnupg < 0.4.4 - Improper Input Validation

Title source: rule

Description

python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.

Exploits (2)

nomisec WORKING POC 6 stars
by brianwrf · poc
https://github.com/brianwrf/CVE-2019-6690
nomisec WORKING POC 1 stars
by stigtsp · poc
https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability

Scores

CVSS v3 7.5
EPSS 0.2143
EPSS Percentile 95.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Classification

CWE
CWE-20
Status published

Affected Products (9)

python/python-gnupg
debian/debian_linux
debian/debian_linux
opensuse/leap
suse/backports
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
pypi/python-gnupg < 0.4.4PyPI

Timeline

Published Mar 21, 2019
Tracked Since Feb 18, 2026