Directory Traversal Affecting platform-python-pip package, versions <0:9.0.3-18.el8
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-PLATFORMPYTHONPIP-2055856
- published 26 Jul 2021
- disclosed 16 Apr 2019
Introduced: 16 Apr 2019
CVE-2019-20916 Open this link in a new tabHow to fix?
Upgrade Centos:8
platform-python-pip
to version 0:9.0.3-18.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream platform-python-pip
package and not the platform-python-pip
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
References
- https://access.redhat.com/security/cve/CVE-2019-20916
- https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace
- https://github.com/pypa/pip/compare/19.1.1...19.2
- https://github.com/pypa/pip/issues/6413
- https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html
- https://access.redhat.com/errata/RHSA-2020:4432
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html