CVE-2018-1000070

Bitmessage PyBitmessage version v0.6.2 (and introduced in or after commit 8ce72d8d2d25973b7064b1cf76a6b0b3d62f0ba0) contains a Eval injection vulnerability in main program, file src/messagetypes/__init__.py function constructObject that can result in Code Execution. This attack appears to be exploitable via remote attacker using a malformed message which must be processed by the victim - e.g. arrive from any sender on bitmessage network. This vulnerability appears to have been fixed in v0.6.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitmessage:pybitmessage:0.6.2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments - Patch, Third Party Advisory () https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments - Patch, Third Party Advisory

Information

Published : 2018-03-13 15:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000070

Mitre link : CVE-2018-1000070

CVE.ORG link : CVE-2018-1000070


JSON object : View

Products Affected

bitmessage

  • pybitmessage
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')