CVE-2022-23472

Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the python `random` library for random value selection. The python `random` library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords. This issue has been addressed in version 1.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:passeo_project:passeo:*:*:*:*:*:python:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.9
References () https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a - Patch, Third Party Advisory () https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a - Patch, Third Party Advisory
References () https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h - Third Party Advisory () https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h - Third Party Advisory
References () https://peps.python.org/pep-0506/ - Third Party Advisory () https://peps.python.org/pep-0506/ - Third Party Advisory

Information

Published : 2022-12-06 18:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23472

Mitre link : CVE-2022-23472

CVE.ORG link : CVE-2022-23472


JSON object : View

Products Affected

passeo_project

  • passeo
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)