Safety vulnerability ID: 36605
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Snappass 1.4.1 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
Latest version: 1.6.2
It's like SnapChat... for Passwords.
-------------
* Switch to local (non-CDN) Font Awesome assets
* Upgraded cryptography to 2.3.1 (for CVE-2018-10903, although snappass is
unaffected because it doesn't use the vulnerable ``finalize_with_tag`` API)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application