The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/pypa/pip/issues/6413 | patch exploit |
https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace | patch |
https://github.com/pypa/pip/compare/19.1.1...19.2 | patch |
https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html | mailing list third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |