CVE-2022-21668 — Improper Input Validation in Pipenv
CWE-20 — Improper Input ValidationCWE-77 — Command InjectionCWE-78 — OS Command InjectionCWE-427 — Uncontrolled Search Path ElementCWE-791 — Incomplete Filtering of Special ElementsCWE-190 — Integer Overflow or WraparoundCWE-1284 — Improper Validation of Specified Quantity in Input5 documents4 sources
Severity
8.6HIGHNVD
EPSS
1.5%
top 18.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 10
Latest updateJan 12
Description
pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0
Affected Packages4 packages
Also affects: Fedora 34, 35, 36
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2022-21668: pipenv - pipenv is a Python development workflow tool. Starting with version 2018.10.9 an...↗2022