Directory Traversal Affecting python-pip package, versions *
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-PYTHONPIP-609805
- published 5 Sep 2020
- disclosed 4 Sep 2020
Introduced: 4 Sep 2020
CVE-2019-20916 Open this link in a new tabHow to fix?
There is no fixed version for Debian:10
python-pip
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-pip
package and not the python-pip
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
References
- https://security-tracker.debian.org/tracker/CVE-2019-20916
- https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace
- https://github.com/pypa/pip/compare/19.1.1...19.2
- https://github.com/pypa/pip/issues/6413
- https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html