pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T19:25:45.478Z
Reserved: 2013-02-06T00:00:00Z
Link: CVE-2013-1629

No data.

Status : Modified
Published: 2013-08-06T02:52:10.177
Modified: 2024-11-21T01:50:01.790
Link: CVE-2013-1629

No data.