Bitmessage PyBitmessage version v0.6.2 (and introduced in or after commit 8ce72d8d2d25973b7064b1cf76a6b0b3d62f0ba0) contains a Eval injection vulnerability in main program, file src/messagetypes/__init__.py function constructObject that can result in Code Execution. This attack appears to be exploitable via remote attacker using a malformed message which must be processed by the victim - e.g. arrive from any sender on bitmessage network. This vulnerability appears to have been fixed in v0.6.3.
References
Link | Resource |
---|---|
https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments | Patch Third Party Advisory |
https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments - Patch, Third Party Advisory |
Information
Published : 2018-03-13 15:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000070
Mitre link : CVE-2018-1000070
CVE.ORG link : CVE-2018-1000070
JSON object : View
Products Affected
bitmessage
- pybitmessage
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')