First published: Tue Nov 05 2019(Updated: )
The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-pip | 20.3.4-4+deb11u1 23.0.1+dfsg-1 24.2+dfsg-1 | |
pip/pip | <1.5 | 1.5 |
pypa pip | <1.5 | |
Python Virtualenv | =12.0.7 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
redhat openshift | =1.0 | |
redhat openshift | =2.0 | |
redhat software collections | ||
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5123 is a vulnerability that affects the mirroring support (-M, --use-mirrors) in Python Pip before version 1.5.
CVE-2013-5123 relies on insecure DNS querying and authenticity checks, allowing attackers to perform man-in-the-middle attacks.
The software affected by CVE-2013-5123 includes Python Pip before version 1.5, Pypa Pip version up to 1.5, Virtualenv Virtualenv version 12.0.7, Fedoraproject Fedora versions 20 and 21, IBM Robotic Process Automation as a Service versions 1.0 and 2.0, Redhat Software Collections, and Debian Debian Linux versions 8.0, 9.0, and 10.0.
The severity of CVE-2013-5123 is medium with a score of 5.9.
To fix CVE-2013-5123, update Python Pip to version 1.5 or later, or apply the recommended patches for the affected software.