CVE-2013-1629
Gentoo Linux Security Advisory 201309-05
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
“pip” anterior a v1.3 utiliza HTTP para recuperar paquetes del repositorio PyPI, y no realiza comprobaciones de integridad en el contenido del paquete, que permite a atacantes man-in-the-middle ejecutar código arbitrario a través de una respuesta diseñada a una operación de "pip install".
Multiple vulnerabilities have been found in pip, which may allow remote attackers to execute arbitrary code or local attackers to conduct symlink attacks. Versions less than 1.3.1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-06 CVE Reserved
- 2013-08-06 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=968059 | Issue Tracking | |
https://github.com/pypa/pip/issues/425 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a | 2024-09-16 |
URL | Date | SRC |
---|---|---|
https://github.com/pypa/pip/pull/791/files | 2021-03-15 |
URL | Date | SRC |
---|---|---|
http://www.pip-installer.org/en/latest/installing.html | 2021-03-15 | |
http://www.pip-installer.org/en/latest/news.html#changelog | 2021-03-15 |