CNNVD-ID编号 | CNNVD-202009-303 |
CVE编号 | CVE-2019-20916 |
发布时间 | 2020-09-04 |
更新时间 | 2021-01-21 |
漏洞类型 | 路径遍历 |
漏洞来源 | N/A |
危险等级 | 高危 |
威胁类型 | 远程 |
厂 商 | N/A |
Python是Python软件基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。
Python pip 19.2之前版本中存在安全漏洞。攻击者借助该漏洞可以进行目录遍历。
目前厂商已发布升级了Python 路径遍历漏洞的补丁,Python 路径遍历漏洞的补丁获取链接:
https://github.com/pypa/pip/issues/6413
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html
来源:MISC
链接:https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html
来源:MISC
来源:MISC
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160125/Red-Hat-Security-Advisory-2020-5149-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159650/Red-Hat-Security-Advisory-2020-4273-01.html
来源:www.auscert.org.au
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Python-pip-directory-traversal-via-Install-Command-33312
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160889/Red-Hat-Security-Advisory-2021-0050-01.html
暂无