Skip to main content
Version: latest

CVE-2018-20225

CVE Details

Visit the official vulnerability details page for CVE-2018-20225 to learn more.

Initial Publication

11/10/2024

Last Update

12/16/2024

Third Party Dependency

py3-pip

NIST CVE Summary

An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely

CVE Severity

7.8

Our Official Summary

This flaw was found in the python-pip component and only affects the --extra-index-url option. Exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). Risk of exploitation is low for our products as this CVE is reported on a backend container. Attacker must gain privileged access to the container and run pip on the container to be able to exploit this.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.11⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.10⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.8⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.5.8, 4.5.10, 4.5.11 to 4.5.8, 4.5.10, 4.5.11, 4.5.15
12/11/2024Official summary revised: This flaw was found in the python-pip component and only affects the --extra-index-url option. Exploitation requiresthat the package does not already exist in the public index (and thus the attacker can put the package there with anarbitrary version number). Risk of exploitation is low for our products as this CVE is reported on a backend container.Attacker must gain privileged access to the container and run pip on the container to be able to exploit this.
12/11/2024Official summary revised: A null pointer dereference flaw was found in Libtiff via tif_dirinfo.c. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.The risk of exploitation of this vulnerability for our products is low as these containers canot be modified without privileged access and running arbitrary code. Containers have security controls in place to prevent these actions. We will wait for an upstream fix and then upgrade these components.
11/15/2024Impacted versions changed from 4.5.8, 4.5.10 to 4.5.8, 4.5.10, 4.5.11
11/15/2024Impacted versions changed from 4.5.8 to 4.5.8, 4.5.10