We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49824

conda-smithy Insecure Encryption Vulnerable to Oracle Padding Attack



Description

conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travis_encrypt_binstar_token implementation in the conda-smithy package has been identified as vulnerable to an Oracle Padding Attack. This vulnerability results from the use of an outdated and insecure padding scheme during RSA encryption. A malicious actor with access to an oracle system can exploit this flaw by iteratively submitting modified ciphertexts and analyzing responses to infer the plaintext without possessing the private key. This issue has been patched in version 3.47.1.

Reserved 2025-06-11 | Published 2025-06-17 | Updated 2025-06-17 | Assigner GitHub_M


LOW: 1.7CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:U

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 3.47.1
affected

References

github.com/...smithy/security/advisories/GHSA-2xf4-hg9q-m58q

github.com/...ommit/24cc0a55a363479e797c825be3a7f2603ef374a1

github.com/...3967ce5f700643d322/conda_smithy/ci_register.py

cve.org (CVE-2025-49824)

nvd.nist.gov (CVE-2025-49824)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49824

Support options

Helpdesk Chat, Email, Knowledgebase