vulnerability
SUSE: CVE-2019-20916: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Sep 4, 2020 | Oct 1, 2020 | Feb 4, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 4, 2020
Added
Oct 1, 2020
Modified
Feb 4, 2022
Description
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
Solutions
suse-upgrade-libpython2_7-1_0suse-upgrade-libpython2_7-1_0-32bitsuse-upgrade-libpython3_4m1_0suse-upgrade-libpython3_4m1_0-32bitsuse-upgrade-libpython3_6m1_0suse-upgrade-libpython3_6m1_0-32bitsuse-upgrade-pythonsuse-upgrade-python-32bitsuse-upgrade-python-basesuse-upgrade-python-base-32bitsuse-upgrade-python-cursessuse-upgrade-python-demosuse-upgrade-python-develsuse-upgrade-python-docsuse-upgrade-python-doc-pdfsuse-upgrade-python-gdbmsuse-upgrade-python-idlesuse-upgrade-python-pipsuse-upgrade-python-setuptoolssuse-upgrade-python-tksuse-upgrade-python-xmlsuse-upgrade-python2-pipsuse-upgrade-python2-pip-wheelsuse-upgrade-python2-setuptoolssuse-upgrade-python2-setuptools-testsuse-upgrade-python2-setuptools-wheelsuse-upgrade-python3suse-upgrade-python3-32bitsuse-upgrade-python3-basesuse-upgrade-python3-base-32bitsuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-docsuse-upgrade-python3-doc-devhelpsuse-upgrade-python3-idlesuse-upgrade-python3-pipsuse-upgrade-python3-pip-wheelsuse-upgrade-python3-setuptoolssuse-upgrade-python3-setuptools-testsuse-upgrade-python3-setuptools-wheelsuse-upgrade-python3-testsuitesuse-upgrade-python3-tksuse-upgrade-python3-toolssuse-upgrade-python36suse-upgrade-python36-basesuse-upgrade-python39-pipsuse-upgrade-python39-setuptools
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.