Safety vulnerability ID: 52346
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Passeo 1.0.5 includes a fix for CVE-2022-23472: Versions prior to 1.0.5 rely on the python 'random' library for random value selection. The python 'random' library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords.
https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h
Latest version: 1.1.3
🔓 Generate a Password with multiple options
Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the python `random` library for random value selection. The python `random` library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords. This issue has been addressed in version 1.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2022-23472.
MISC:https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a: https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a
MISC:https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h: https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h
MISC:https://peps.python.org/pep-0506/: https://peps.python.org/pep-0506/
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application