Miggo Logo

CVE-2019-15796: python-apt Does Not Check Hash Signature

4.7

CVSS Score
3.1

Basic Information

EPSS Score
0.33874%
Published
5/24/2022
Updated
9/26/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
python-aptpip< 0.8.3ubuntu7.50.8.3ubuntu7.5
python-aptpip>= 0.9.0, < 0.9.3.5ubuntu30.9.3.5ubuntu3
python-aptpip>= 1.2.0, < 1.6.5ubuntu0.11.6.5ubuntu0.1
python-aptpip>= 1.7.0, < 1.9.0ubuntu1.21.9.0ubuntu1.2
python-aptpip>= 1.9.1, < 1.9.51.9.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly names Version.fetch_binary(), Version.fetch_source() in apt/package.py and _fetch_archives() in apt/cache.py as functions that lacked hash signature verification. Multiple authoritative sources (CVE, GHSA, Ubuntu security notices) confirm these entry points failed to enforce cryptographic signature checks, which is directly tied to CWE-347. The functions' roles in package fetching operations make them logical points for this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Pyt*on-*pt *o*sn't ****k i* **s**s *r* si*n** in `V*rsion.**t**_*in*ry()` *n* `V*rsion.**t**_sour**()` o* *pt/p**k***.py or in `_**t**_*r**iv*s()` o* *pt/*****.py in v*rsion *.*.*u*untu* *n* **rli*r. T*is *llows *ownlo**s *rom unsi*n** r*positori*s w

Reasoning

T** vuln*r**ility **s*ription *xpli*itly n*m*s V*rsion.**t**_*in*ry(), V*rsion.**t**_sour**() in *pt/p**k***.py *n* _**t**_*r**iv*s() in *pt/*****.py *s *un*tions t**t l**k** **s* si*n*tur* v*ri*i**tion. Multipl* *ut*orit*tiv* sour**s (*V*, **S*, U*u