CVE-2024-41951: PheonixAppAPI has visible Encoding Maps
4.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11415%
CWE
Published
7/31/2024
Updated
11/12/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| PheonixAppAPI | pip | < 0.2.5 | 0.2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from exposed encoding/decoding maps in the codebase. The commit diff shows these cryptographic operations are handled in FileManager.py's Encoded functions. The advisory explicitly states the encoding maps were visible in code (CWE-323 context), and these functions directly implement the vulnerable encoding/decoding logic. The high confidence comes from: 1) Advisory directly referencing encoding map exposure 2) CWE-323 alignment with static cryptographic material reuse 3) Functions' responsibility for cryptographic operations 4) Post-install script requirement suggesting key/map generation was moved out of code in the patch.