Vulnerability Details : CVE-2013-1630
pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a download operation.
Vulnerability category: Input validationExecute code
Products affected by CVE-2013-1630
- cpe:2.3:a:guillaume_gauvrit:pyshop:*:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:guillaume_gauvrit:pyshop:0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1630
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1630
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-1630
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1630
-
https://github.com/mardiros/pyshop/blob/master/CHANGES.txt
Page not found · GitHub · GitHub
-
http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/
Warning: don't use pip in an untrusted network! – a practical man-in-the-middle attack on pip : Python
-
https://github.com/mardiros/pyshop/commit/ffadb0bcdef1e385884571670210cfd6ba351784
Improve security when downloading from pypi · mardiros/pyshop@ffadb0b · GitHub
Jump to