Miggo Logo

CVE-2019-15795: python-apt Flawed Package Integrity Check

4.7

CVSS Score
3.1

Basic Information

EPSS Score
0.34995%
Published
5/24/2022
Updated
9/26/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
python-aptpip< 0.8.3ubuntu7.50.8.3ubuntu7.5
python-aptpip>= 0.9.0, < 0.9.3.5ubuntu30.9.3.5ubuntu3
python-aptpip>= 1.0.0, < 1.1.01.1.0
python-aptpip>= 1.2.0, < 1.6.5ubuntu0.11.6.5ubuntu0.1
python-aptpip>= 1.7.0, < 1.9.0ubuntu1.21.9.0ubuntu1.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states that the MD5 check vulnerability exists in Version.fetch_binary() and Version.fetch_source() in apt/package.py. Multiple sources (GitHub Advisory, NVD, Ubuntu security notices) confirm these functions as the vulnerable points. The CWE-327 mapping confirms the use of a broken cryptographic algorithm (MD5) is the root cause. The functions' names and file path are directly referenced in the vulnerability description, providing high confidence in their identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

pyt*on-*pt only ****ks t** M** sums o* *ownlo**** *il*s in `V*rsion.**t**_*in*ry()` *n* `V*rsion.**t**_sour**()` o* *pt/p**k***.py in v*rsion *.*.*u*untu* *n* **rli*r. T*is *llows * m*n-in-t**-mi**l* *tt**k w*i** *oul* pot*nti*lly ** us** to inst*ll

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t t** M** ****k vuln*r**ility *xists in V*rsion.**t**_*in*ry() *n* V*rsion.**t**_sour**() in *pt/p**k***.py. Multipl* sour**s (*it*u* **visory, NV*, U*untu s**urity noti**s) *on*irm t**s* *un*tions *