Executive Summary

Informations
Name CVE-2025-49824 First vendor Publication 2025-06-17
Vendor Cve Last vendor Modification 2025-06-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travis_encrypt_binstar_token implementation in the conda-smithy package has been identified as vulnerable to an Oracle Padding Attack. This vulnerability results from the use of an outdated and insecure padding scheme during RSA encryption. A malicious actor with access to an oracle system can exploit this flaw by iteratively submitting modified ciphertexts and analyzing responses to infer the plaintext without possessing the private key. This issue has been patched in version 3.47.1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49824

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

Sources (Detail)

https://github.com/conda-forge/conda-smithy/blob/46a06524eeeb7f59e0969c3967ce...
https://github.com/conda-forge/conda-smithy/commit/24cc0a55a363479e797c825be3...
https://github.com/conda-forge/conda-smithy/security/advisories/GHSA-2xf4-hg9...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-06-18 21:20:34
  • Multiple Updates
2025-06-18 00:20:33
  • First insertion