CVE-2018-12356

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-12356
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-12356.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-12356
Related
Published
2018-06-15T02:29:00Z
Modified
2024-11-21T03:45:02Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in password-store.sh in pass in Simple Password Store 1.7.x before 1.7.2. The signature verification routine parses the output of GnuPG with an incomplete regular expression, which allows remote attackers to spoof file signatures on configuration files and extension scripts. Modifying the configuration file allows the attacker to inject additional encryption keys under their control, thereby disclosing passwords to the attacker. Modifying the extension scripts allows the attacker arbitrary code execution.

References

Affected packages

Debian:11 / password-store

Package

Name
password-store
Purl
pkg:deb/debian/password-store?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / password-store

Package

Name
password-store
Purl
pkg:deb/debian/password-store?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / password-store

Package

Name
password-store
Purl
pkg:deb/debian/password-store?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}