CVE-2020-24972

HIGH

GnuPG <3.1.12 - RCE

Title source: llm
STIX 2.1

Description

The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL.

Exploits (1)

nomisec WORKING POC 1 stars
by SpiralBL0CK · poc
https://github.com/SpiralBL0CK/CVE-2020-24972

References (6)

Core 6
Core References
Exploit, Vendor Advisory x_refsource_misc
https://dev.gnupg.org/source/kleo/browse/master/CMakeLists.txt
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202008-21
Broken Link, Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00053.html
Broken Link, Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00064.html

Scores

CVSS v3 8.8
EPSS 0.2134
EPSS Percentile 95.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-116
Status published
Products (4)
fedoraproject/fedora 32
kleopatra_project/kleopatra < 20.07.80
opensuse/backports_sle 15.0 sp1
opensuse/leap 15.1
Published Aug 29, 2020
Tracked Since Feb 18, 2026