Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1703

Опубликовано: 02 фев. 2026
Источник: debian
EPSS Низкий

Описание

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-pipfixed26.0+dfsg-1package
python-pipno-dsatrixiepackage
python-pipno-dsabookwormpackage
python-pippostponedbullseyepackage

Примечания

  • https://github.com/pypa/pip/pull/13777

  • Fixed by: https://github.com/pypa/pip/commit/4c651b70d60ed91b13663bcda9b3ed41748d0124 (26.0)

  • https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ/

EPSS

Процентиль: 3%
0.00017
Низкий

Связанные уязвимости

ubuntu
5 дней назад

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

nvd
5 дней назад

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

github
5 дней назад

pip Path Traversal vulnerability

EPSS

Процентиль: 3%
0.00017
Низкий