pip prior to 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle malicious users to execute arbitrary code via a crafted response to a "pip install" operation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pypa pip |