A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://github.com/bndr/pipreqs/pull/364 | patch exploit vendor advisory mitigation |
https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe | mitigation third party advisory exploit |