Vulnerability Description
pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a download operation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Guillaume Gauvrit | Pyshop | <= 0.7 |
Related Weaknesses (CWE)
References
- http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrus
- https://github.com/mardiros/pyshop/blob/master/CHANGES.txt
- https://github.com/mardiros/pyshop/commit/ffadb0bcdef1e385884571670210cfd6ba3517
- http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrus
- https://github.com/mardiros/pyshop/blob/master/CHANGES.txt
- https://github.com/mardiros/pyshop/commit/ffadb0bcdef1e385884571670210cfd6ba3517
FAQ
What is CVE-2013-1630?
CVE-2013-1630 is a vulnerability with a CVSS score of 6.8 (MEDIUM). pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary co...
How severe is CVE-2013-1630?
CVE-2013-1630 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1630?
Check the references section above for vendor advisories and patch information. Affected products include: Guillaume Gauvrit Pyshop.