CVE-2024-25711
Python vulnerability analysis and mitigation

Overview

CVE-2024-25711 affects diffoscope versions before 256, allowing directory traversal via an embedded filename in a GPG file. The vulnerability was discovered and disclosed in early 2024, impacting the diffoscope tool used for file comparison and analysis. The issue specifically affects the GPG file handling functionality of the software (NVD, CVE).

Technical details

The vulnerability stems from diffoscope's trust in the gpg --use-embedded-filenames option when processing GPG files. This implementation flaw allows an attacker to exploit directory traversal through specially crafted embedded filenames in GPG files. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating high severity with network attack vector and no required privileges or user interaction (NVD).

Impact

When exploited, the vulnerability allows an attacker to disclose contents of arbitrary files on the system, such as ../.ssh/id_rsa, by leveraging the embedded filename functionality in GPG files. The impact is particularly concerning as it could lead to exposure of sensitive files and information (Debian Issue).

Mitigation and workarounds

The vulnerability has been fixed in diffoscope version 256 and later. Users are strongly advised to upgrade to the latest version. For Fedora 39 users, an update to version 257-1.fc39 is available that addresses this vulnerability (Fedora Update).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management