A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2021-3572 - Medium Severity Vulnerability
Vulnerable Library - pip-1.3.1.tar.gz
The PyPA recommended tool for installing Python packages.
Library home page: https://files.pythonhosted.org/packages/5b/ce/f5b98104f1c10d868936c25f7c597f492d4371aa9ad5fb61a94954ee7208/pip-1.3.1.tar.gz
Path to vulnerable library: /blackrain2020/original-sources-3rd-party/pip-1.3.1.tar.gz
Dependency Hierarchy: - :x: **pip-1.3.1.tar.gz** (Vulnerable Library)
Found in HEAD commit: 02897e9bc70b622baac54a392f534fd0dfa9cccf
Found in base branch: master
Vulnerability Details
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
Publish Date: 2021-11-10
URL: CVE-2021-3572
CVSS 3 Score Details (5.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://security.archlinux.org/CVE-2021-3572
Release Date: 2021-11-10
Fix Resolution: 21.1
Step up your Open Source Security Game with Mend here