Описание
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
Ссылки
- Vendor Advisory
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Vendor Advisory
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3 (исключая)
cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.39922
Средний
6.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
ubuntu
больше 12 лет назад
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
debian
больше 12 лет назад
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository ...
EPSS
Процентиль: 97%
0.39922
Средний
6.8 Medium
CVSS2
Дефекты
CWE-20