Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20916

Опубликовано: 16 апр. 2019
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

A flaw was found in the pip package installer for Python when downloading or installing a remote package via a specified URL. Improper validation of the "Content-Disposition" HTTP response header makes a path traversal attack possible, leading to an arbitrary file overwrite. This flaw allows an attacker who controls a malicious server to execute arbitrary code on the system.

Отчет

This issue has been rated as having Moderate impact because of the preconditions needed to trigger the flaw: it only affects Python Wheels and requires the user to pip-install a wheel from a malicious server. Installing software from untrusted servers is insecure by definition and strongly discouraged, as it may lead to system compromise regardless of this CVE. This flaw did not affect the versions of python-pip in Python 3.8 as shipped with Red Hat Enterprise Linux 8 and Red Hat Software Collections 3, as they already included the fix for this CVE.

Меры по смягчению последствий

Avoid downloading or installing packages from potentially malicious servers via the command-line "pip download" or "pip install".

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7python-pipWill not fix
Red Hat Enterprise Linux 8python38:3.8/python3x-pipNot affected
Red Hat Software Collectionsrh-python38-python-pipNot affected
Red Hat Enterprise Linux 7python-virtualenvFixedRHSA-2022:523428.06.2022
Red Hat Enterprise Linux 8python-pipFixedRHSA-2020:443204.11.2020
Red Hat Enterprise Linux 8python27FixedRHSA-2020:465404.11.2020
Red Hat Enterprise Linux 8python-pipFixedRHSA-2020:443204.11.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-python36-pythonFixedRHSA-2020:428519.10.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-python36-python-pipFixedRHSA-2020:428519.10.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-python36-python-virtualenvFixedRHSA-2020:428519.10.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1868135python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py

EPSS

Процентиль: 69%
0.00622
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

CVSS3: 7.5
nvd
почти 5 лет назад

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
почти 5 лет назад

The pip package before 19.2 for Python allows Directory Traversal when ...

suse-cvrf
больше 4 лет назад

Security update for python

EPSS

Процентиль: 69%
0.00622
Низкий

8 High

CVSS3