CVE-2024-6345

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
@huntr_aiCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
Debian logo
Debian Releases
Debian Product
Codename
setuptools
bullseye
vulnerable
bullseye (security)
52.0.0-4+deb11u2
fixed
bookworm
66.1.1-1+deb12u1
fixed
trixie
78.1.0-1.2
fixed
sid
78.1.1-0.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-pip
plucky
not-affected
oracular
not-affected
noble
not-affected
jammy
not-affected
focal
Fixed 20.0.2-5ubuntu1.10+esm2
released
bionic
Fixed 9.0.1-2.3~ubuntu1.18.04.8+esm4
released
xenial
Fixed 8.1.1-2ubuntu0.6+esm8
released
trusty
Fixed 1.5.4-1ubuntu4+esm5
released
python-setuptools
plucky
dne
oracular
dne
noble
dne
jammy
Fixed 44.1.1-1.2ubuntu0.22.04.1+esm1
released
focal
Fixed 44.0.0-2ubuntu0.1+esm1
released
bionic
Fixed 39.0.1-2ubuntu0.1+esm1
released
xenial
Fixed 20.7.0-1ubuntu0.1~esm2
released
trusty
Fixed 3.3-1ubuntu2+esm2
released
setuptools
plucky
not-affected
oracular
not-affected
noble
Fixed 68.1.2-2ubuntu1.1
released
jammy
Fixed 59.6.0-1.2ubuntu0.22.04.2
released
focal
Fixed 45.2.0-1ubuntu0.2
released