Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-21668
HistoryJan 10, 2022 - 12:00 a.m.

CVE-2022-21668

2022-01-1000:00:00
ubuntu.com
ubuntu.com
14

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

65.3%

pipenv is a Python development workflow tool. Starting with version
2018.10.9 and prior to version 2022.1.8, a flaw in pipenv’s parsing of
requirements files allows an attacker to insert a specially crafted string
inside a comment anywhere within a requirements.txt file, which will cause
victims who use pipenv to install the requirements file to download
dependencies from a package index server controlled by the attacker. By
embedding malicious code in packages served from their malicious index
server, the attacker can trigger arbitrary remote code execution (RCE) on
the victims’ systems. If an attacker is able to hide a malicious
--index-url option in a requirements file that a victim installs with
pipenv, the attacker can embed arbitrary malicious code in packages served
from their malicious index server that will be executed on the victim’s
host during installation (remote code execution/RCE). When pip installs
from a source distribution, any code in the setup.py is executed by the
install process. This issue is patched in version 2022.1.8. The GitHub
Security Advisory contains more information about this vulnerability.

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

65.3%