Information Exposure Affecting openssh-key-parser package, versions [,0.0.6)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-OPENSSHKEYPARSER-2944262
  • published7 Jul 2022
  • disclosed7 Jul 2022
  • creditMike Doyle

Introduced: 7 Jul 2022

CVE-2022-31124  (opens in a new tab)
CWE-209  (opens in a new tab)

How to fix?

Upgrade openssh-key-parser to version 0.0.6 or higher.

Overview

openssh-key-parser is an Utilities to parse and pack OpenSSH private and public key files

Affected versions of this package are vulnerable to Information Exposure when raw field values are reported in error messages. By modifying the length of a field to be shorter than it is declared to be, the field's value is exposed in the resulting error message.

CVSS Scores

version 3.1