Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01OXg0LTY3bWgtcHg1NM0s4Q
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
Permalink: https://github.com/advisories/GHSA-59x4-67mh-px54JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01OXg0LTY3bWgtcHg1NM0s4Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: about 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-59x4-67mh-px54, CVE-2022-24953
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-24953
- https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e
- https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04
- https://github.com/advisories/GHSA-59x4-67mh-px54
Blast Radius: 10.0
Affected Packages
packagist:pear/crypt_gpg
Dependent packages: 7Dependent repositories: 77
Downloads: 2,666,508 total
Affected Version Ranges: < 1.6.7
Fixed in: 1.6.7
All affected versions: 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.6.6
All unaffected versions: 1.6.7, 1.6.8, 1.6.9