Lucene search

K
githubGitHub Advisory DatabaseGHSA-CX63-2MW6-8HW5
HistoryJul 15, 2024 - 3:30 a.m.

setuptools vulnerable to Command Injection via package URL

2024-07-1503:30:57
CWE-94
GitHub Advisory Database
github.com
25
setuptools
remote code execution
package index
vulnerability
command injection
version 69.1.1
version 70.0

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

Affected configurations

Vulners
Node
pythonsetuptoolsRange<70.0.0
VendorProductVersionCPE
pythonsetuptools*cpe:2.3:a:python:setuptools:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H