Lucene search

K
redhatcveRedhat.comRH:CVE-2023-5752
HistoryNov 21, 2023 - 4:19 a.m.

CVE-2023-5752

2023-11-2104:19:54
redhat.com
access.redhat.com
25
python pip
local attacker
security restrictions
mercurial vcs
injection
configuration options
package installation
cve-2023-5752
mitigation
red hat product security

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.8 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

A flaw was found in the Python pip package. The pip could allow a local authenticated attacker to bypass security restrictions due to a flaw when installing a package from a Mercurial VCS URL. By sending a specially crafted request, an attacker can inject arbitrary configuration options to the “hg clone” call to modify how and which repository is installed.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.8 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%