Vulnerability CVE-2013-1629


Published: 2013-08-05   Modified: 2013-08-07

Description:
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
VENDOR -> PRODUCT 
Pip-installer -> PIP 

 References:
https://github.com/pypa/pip/pull/791/files
https://github.com/pypa/pip/issues/425
https://bugzilla.redhat.com/show_bug.cgi?id=968059
http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/
http://www.pip-installer.org/en/latest/news.html#changelog
http://www.pip-installer.org/en/latest/installing.html

Copyright 2024, cxsecurity.com

 

Back to Top