Safety vulnerability ID: 39129
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 4.0.1
AWS Encryption SDK implementation for Python
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later. See CVE-2020-8897.
CONFIRM:https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/: https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/
CONFIRM:https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf: https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application