CVE-2021-3572: Improper Input Validation in pip
(updated )
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
References
- access.redhat.com/errata/RHSA-2021:3254
- bugzilla.redhat.com/show_bug.cgi?id=1962856
- github.com/advisories/GHSA-5xp3-jfq3-5q8x
- github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2021-437.yaml
- github.com/pypa/pip
- github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
- github.com/pypa/pip/pull/9827
- nvd.nist.gov/vuln/detail/CVE-2021-3572
- packetstormsecurity.com/files/162712/USN-4961-1.txt
- security.netapp.com/advisory/ntap-20240621-0006
- www.oracle.com/security-alerts/cpuapr2022.html
- www.oracle.com/security-alerts/cpujul2022.html
Detect and mitigate CVE-2021-3572 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →