Vulnerability Details : CVE-2023-31543
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
Vulnerability category: Execute code
Products affected by CVE-2023-31543
- Pipreqs Project » Pipreqs » For PythonVersions from including (>=) 0.3.0 and up to, including, (<=) 0.4.11cpe:2.3:a:pipreqs_project:pipreqs:*:*:*:*:*:python:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31543
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31543
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-31543
-
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31543
-
https://github.com/bndr/pipreqs/pull/364
Mitigation for dependency confusion in pipreqs by adeadfed · Pull Request #364 · bndr/pipreqs · GitHubExploit;Mitigation;Patch;Vendor Advisory
-
https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe
Dependency confusion in pipreqs · GitHubExploit;Mitigation;Third Party Advisory
Jump to