{"0.2":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":38734,"upload_time_iso_8601":"2008-10-28T17:22:10Z","url":"https://files.pythonhosted.org/packages/3d/9d/1e313763bdfb6a48977b65829c6ce2a43eaae29ea2f907c8bbef024a7219/pip-0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.2.1":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.2.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":39802,"upload_time_iso_8601":"2008-11-17T18:17:56Z","url":"https://files.pythonhosted.org/packages/18/ad/c0fe6cdfe1643a19ef027c7168572dac6283b80a384ddf21b75b921877da/pip-0.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.3":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.3/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":47710,"upload_time_iso_8601":"2009-01-21T04:46:30Z","url":"https://files.pythonhosted.org/packages/17/05/f66144ef69b436d07f8eeeb28b7f77137f80de4bf60349ec6f0f9509e801/pip-0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.3.1":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.3.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":48486,"upload_time_iso_8601":"2009-01-29T18:19:54Z","url":"https://files.pythonhosted.org/packages/0a/bb/d087c9a1415f8726e683791c0b2943c53f2b76e69f527f2e2b2e9f9e7b5c/pip-0.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.4":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.4/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":50238,"upload_time_iso_8601":"2009-05-27T19:46:54.467565Z","url":"https://files.pythonhosted.org/packages/cf/c3/153571aaac6cf999f4bb09c019b1ff379b7b599ea833813a41c784eec995/pip-0.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.5":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.5/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.5","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.5.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":53939,"upload_time_iso_8601":"2009-10-07T22:26:01.995336Z","url":"https://files.pythonhosted.org/packages/8d/c7/f05c87812fa5d9562ecbc5f4f1fc1570444f53c81c834a7f662af406e3c1/pip-0.5.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.5.1":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.5.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.5.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.5.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":54633,"upload_time_iso_8601":"2009-10-08T23:14:32.632843Z","url":"https://files.pythonhosted.org/packages/9a/aa/f536b6d14fe03343367da2ff44eee28f340ae650cd017ca088b6be13084a/pip-0.5.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.6":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.6/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.6","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.6.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":64109,"upload_time_iso_8601":"2009-11-10T16:25:40.840877Z","url":"https://files.pythonhosted.org/packages/db/e6/fdf7be8a17b032c533d3f91e91e2c63dd81d3627cbe4113248a00c2d39d8/pip-0.6.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.6.1":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.6.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.6.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.6.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":55299,"upload_time_iso_8601":"2009-11-20T17:31:31.717781Z","url":"https://files.pythonhosted.org/packages/91/cd/105f4d3c75d0ae18e12623acc96f42168aaba408dd6e43c4505aa21f8e37/pip-0.6.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.6.2":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.6.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.6.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.6.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":70677,"upload_time_iso_8601":"2010-01-18T21:41:29.467711Z","url":"https://files.pythonhosted.org/packages/1c/c7/c0e1a9413c37828faf290f29a85a4d6034c145cc04bf1622ba8beb662ad8/pip-0.6.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.6.3":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.6.3/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.6.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.6.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":71146,"upload_time_iso_8601":"2010-01-21T19:26:46.380870Z","url":"https://files.pythonhosted.org/packages/3f/af/c4b9d49fb0f286996b28dbc0955c3ad359794697eb98e0e69863908070b0/pip-0.6.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.7":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.7/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.7","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.7.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":68510,"upload_time_iso_8601":"2010-04-16T22:13:49.488007Z","url":"https://files.pythonhosted.org/packages/ec/7a/6fe91ff0079ad0437830957c459d52f3923e516f5b453218f2a93d09a427/pip-0.7.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.7.1":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.7.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.7.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.7.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":82468,"upload_time_iso_8601":"2010-04-22T09:58:13.668830Z","url":"https://files.pythonhosted.org/packages/a5/63/11303863c2f5e9d9a15d89fcf7513a4b60987007d418862e0fb65c09fff7/pip-0.7.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.7.2":{"info":{"author":"The Open Planning Project","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.7.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.7.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.7.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":68698,"upload_time_iso_8601":"2010-05-27T23:57:27.369130Z","url":"https://files.pythonhosted.org/packages/cd/a9/1debaa96bbc1005c1c8ad3b79fec58c198d35121546ea2e858ce0894268a/pip-0.7.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.8":{"info":{"author":"Ian Bicking","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.8/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.8","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.8.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":98347,"upload_time_iso_8601":"2010-08-03T20:03:43.850429Z","url":"https://files.pythonhosted.org/packages/74/54/f785c327fb3d163560a879b36edae5c78ee07806be282c9d4807f6be7dd1/pip-0.8.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.8.1":{"info":{"author":"Ian Bicking","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.8.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.8.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.8.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":105248,"upload_time_iso_8601":"2010-09-14T18:40:51.780302Z","url":"https://files.pythonhosted.org/packages/5c/79/5e8381cc3078bae92166f2ba96de8355e8c181926505ba8882f7b099a500/pip-0.8.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.8.2":{"info":{"author":"Ian Bicking","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://pip.openplans.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://pip.openplans.org"},"release_url":"https://pypi.org/project/pip/0.8.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.8.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.8.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":106126,"upload_time_iso_8601":"2010-11-29T19:24:08.262456Z","url":"https://files.pythonhosted.org/packages/17/3e/0a98ab032991518741e7e712a719633e6ae160f51b3d3e855194530fd308/pip-0.8.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"0.8.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 4 - Beta","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/0.8.3/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"0.8.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-0.8.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":107684,"upload_time_iso_8601":"2011-03-12T21:17:26.596004Z","url":"https://files.pythonhosted.org/packages/f7/9a/943fc6d879ed7220bac2e7e53096bfe78abec88d77f2f516400e0129679e/pip-0.8.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.0/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":100102,"upload_time_iso_8601":"2011-04-04T19:45:15.450334Z","url":"https://files.pythonhosted.org/packages/24/33/6eb675fb6db7b71d69d6928b33dea61b8bf5cfe1e5649be70ec84ce2fc09/pip-1.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.0.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":104767,"upload_time_iso_8601":"2011-04-30T23:20:23.151103Z","url":"https://files.pythonhosted.org/packages/10/d9/f584e6107ef98ad7eaaaa5d0f756bfee12561fa6a4712ffdb7209e0e1fd4/pip-1.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.0.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.0.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":105820,"upload_time_iso_8601":"2011-07-16T16:52:11.604727Z","url":"https://files.pythonhosted.org/packages/16/90/5e6f80364d8a656f60681dfb7330298edef292d43e1499bcb3a4c71ff0b9/pip-1.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.4","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":95197,"upload_time_iso_8601":"2012-02-16T21:08:04.040768Z","url":"https://files.pythonhosted.org/packages/25/57/0d42cf5307d79913a082c5c4397d46f3793bc35e1138a694136d6e31be99/pip-1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.2/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":94455,"upload_time_iso_8601":"2012-09-01T20:00:19.003287Z","url":"https://files.pythonhosted.org/packages/ba/c3/4e1f892f41aaa217fe0d1f827fa05928783349c69f3cc06fdd68e112678a/pip-1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.2.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.2.1/","summary":"pip installs packages. Python packages. An easy_install replacement","version":"1.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":102413,"upload_time_iso_8601":"2012-09-06T08:30:42.709931Z","url":"https://files.pythonhosted.org/packages/c3/a2/a63244da32afd9ce9a8ca1bd86e71610039adea8b8314046ebe5047527a6/pip-1.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629","GHSA-g3p5-fjj9-h8gj"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"PYSEC-2013-8","link":"https://osv.dev/vulnerability/PYSEC-2013-8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888","GHSA-4gv5-qhvr-36vv"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"PYSEC-2013-9","link":"https://osv.dev/vulnerability/PYSEC-2013-9","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1888"],"details":"pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.","fixed_in":["1.3"],"id":"GHSA-4gv5-qhvr-36vv","link":"https://osv.dev/vulnerability/GHSA-4gv5-qhvr-36vv","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-1629"],"details":"pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a \"pip install\" operation.","fixed_in":["1.3"],"id":"GHSA-g3p5-fjj9-h8gj","link":"https://osv.dev/vulnerability/GHSA-g3p5-fjj9-h8gj","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.3/","summary":"A tool for installing and managing Python packages.","version":"1.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":247401,"upload_time_iso_8601":"2013-03-07T21:38:47.856575Z","url":"https://files.pythonhosted.org/packages/00/45/69d4f2602b80550bfb26cfd2f62c2f05b3b5c7352705d3766cd1e5b27648/pip-1.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.3.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.3.1/","summary":"A tool for installing and managing Python packages.","version":"1.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":247594,"upload_time_iso_8601":"2013-03-07T23:15:15.627713Z","url":"https://files.pythonhosted.org/packages/5b/ce/f5b98104f1c10d868936c25f7c597f492d4371aa9ad5fb61a94954ee7208/pip-1.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.4":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.4/","summary":"A tool for installing and managing Python packages.","version":"1.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":443790,"upload_time_iso_8601":"2013-07-23T20:59:34.269840Z","url":"https://files.pythonhosted.org/packages/5f/d0/3b3958f6a58783bae44158b2c4c7827ae89abaecdd4bed12cff402620b9a/pip-1.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.4.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.5","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"UNKNOWN","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Download":"UNKNOWN","Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.4.1/","summary":"A tool for installing and managing Python packages.","version":"1.4.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.4.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":445199,"upload_time_iso_8601":"2013-08-08T01:12:00.193927Z","url":"https://files.pythonhosted.org/packages/3f/f8/da390e0df72fb61d176b25a4b95262e3dcc14bda0ad25ac64d56db38b667/pip-1.4.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2013-5123","GHSA-c5h8-cq4v-cvfm"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"PYSEC-2019-160","link":"https://osv.dev/vulnerability/PYSEC-2019-160","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2013-5123"],"details":"The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.","fixed_in":["1.5"],"id":"GHSA-c5h8-cq4v-cvfm","link":"https://osv.dev/vulnerability/GHSA-c5h8-cq4v-cvfm","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.5/","summary":"A tool for installing and managing Python packages.","version":"1.5","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":898803,"upload_time_iso_8601":"2014-01-02T13:54:21.142722Z","url":"https://files.pythonhosted.org/packages/4f/7d/e53bc80667378125a9e07d4929a61b0bd7128a1129dbe6f07bb3228652a3/pip-1.5.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.5.1/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1166177,"upload_time_iso_8601":"2014-01-21T03:45:41.381865Z","url":"https://files.pythonhosted.org/packages/44/5d/1dca53b5de6d287e7eb99bd174bb022eb6cb0d6ca6e19ca6b16655dde8c2/pip-1.5.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1078467,"upload_time_iso_8601":"2014-01-21T03:45:43.956185Z","url":"https://files.pythonhosted.org/packages/21/3f/d86a600c9b2f41a75caacf768a24130f343def97652de2345da15ef7911f/pip-1.5.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.5.2/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1167543,"upload_time_iso_8601":"2014-01-26T05:13:15.543443Z","url":"https://files.pythonhosted.org/packages/3d/1f/227d77d5e9ed2df5162de4ba3616799a351eccb1ecd668ae824dd26153a1/pip-1.5.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1079904,"upload_time_iso_8601":"2014-01-26T05:13:19.697617Z","url":"https://files.pythonhosted.org/packages/ed/94/391a003107f6ec997c314199d03bff1c105af758ee490e3255353574487b/pip-1.5.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.5.3/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1169264,"upload_time_iso_8601":"2014-02-21T01:12:43.258172Z","url":"https://files.pythonhosted.org/packages/df/e9/bdb53d44fad1465b43edaf6bc7dd3027ed5af81405cc97603fdff0721ebb/pip-1.5.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1081890,"upload_time_iso_8601":"2014-02-21T01:12:46.847075Z","url":"https://files.pythonhosted.org/packages/55/de/671a48ad313c808623041fc475f7c8f7610401d9f573f06b40eeb84e74e3/pip-1.5.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.4":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"http://www.pip-installer.org","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"http://www.pip-installer.org"},"release_url":"https://pypi.org/project/pip/1.5.4/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.4-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1169272,"upload_time_iso_8601":"2014-02-21T12:19:16.292977Z","url":"https://files.pythonhosted.org/packages/a9/9a/9aa19fe00de4c025562e5fb3796ff8520165a7dd1a5662c6ec9816e1ae99/pip-1.5.4-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1081874,"upload_time_iso_8601":"2014-02-21T12:19:19.196866Z","url":"https://files.pythonhosted.org/packages/78/d8/6e58a7130d457edadb753a0ea5708e411c100c7e94e72ad4802feeef735c/pip-1.5.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.5":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/1.5.5/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.5","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.5-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1173434,"upload_time_iso_8601":"2014-05-03T06:26:46.261575Z","url":"https://files.pythonhosted.org/packages/ce/c2/10d996b9c51b126a9f0bb9e14a9edcdd5c88888323c0685bb9b392b6c47c/pip-1.5.5-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.5.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1084356,"upload_time_iso_8601":"2014-05-03T06:26:49.668653Z","url":"https://files.pythonhosted.org/packages/88/01/a442fde40bd9aaf837612536f16ab751fac628807fd718690795b8ade77d/pip-1.5.5.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"1.5.6":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.1","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/1.5.6/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"A tool for installing and managing Python packages.","version":"1.5.6","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-1.5.6-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1002021,"upload_time_iso_8601":"2014-05-17T02:43:12.301468Z","url":"https://files.pythonhosted.org/packages/3f/08/7347ca4021e7fe0f1ab8f93cbc7d2a7a7350012300ad0e0227d55625e2b8/pip-1.5.6-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-1.5.6.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":938120,"upload_time_iso_8601":"2014-05-17T02:43:15.542077Z","url":"https://files.pythonhosted.org/packages/45/db/4fb9a456b4ec4d3b701456ef562b9d72d76b6358e0c1463d17db18c5b772/pip-1.5.6.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.","fixed_in":["6.0"],"id":"PYSEC-2014-11","link":"https://osv.dev/vulnerability/PYSEC-2014-11","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2014-8991"],"details":"pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a `/tmp/pip-build-*` file for another user.","fixed_in":["6.0"],"id":"GHSA-53mr-44pp-crf4","link":"https://osv.dev/vulnerability/GHSA-53mr-44pp-crf4","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"10.0.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/10.0.0/","requires_dist":["pytest; extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","freezegun; extra == 'testing'"],"requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"10.0.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-10.0.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1306819,"upload_time_iso_8601":"2018-04-14T11:38:05.342706Z","url":"https://files.pythonhosted.org/packages/62/a1/0d452b6901b0157a0134fd27ba89bf95a857fbda64ba52e1ca2cf61d8412/pip-10.0.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-10.0.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1245078,"upload_time_iso_8601":"2018-04-14T11:38:09.539167Z","url":"https://files.pythonhosted.org/packages/e0/69/983a8e47d3dfb51e1463c1e962b2ccd1d74ec4e236e232625e353d830ed2/pip-10.0.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"10.0.0b1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/10.0.0b1/","requires_dist":["pytest; extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","freezegun; extra == 'testing'"],"requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"10.0.0b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-10.0.0b1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1310836,"upload_time_iso_8601":"2018-03-31T10:46:11.450765Z","url":"https://files.pythonhosted.org/packages/4b/5a/8544ae02a5bd28464e03af045e8aabde20a7b02db1911a9159328e1eb25a/pip-10.0.0b1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-10.0.0b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1246649,"upload_time_iso_8601":"2018-03-31T10:46:15.650560Z","url":"https://files.pythonhosted.org/packages/aa/6d/ffbb86abf18b750fb26f27eda7c7732df2aacaa669c420d2eb2ad6df3458/pip-10.0.0b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"10.0.0b2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/10.0.0b2/","requires_dist":["pytest; extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","freezegun; extra == 'testing'"],"requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"10.0.0b2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-10.0.0b2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1308393,"upload_time_iso_8601":"2018-04-02T13:05:06.489157Z","url":"https://files.pythonhosted.org/packages/97/72/1d514201e7d7fc7fff5aac3de9c7b892cd72fb4bf23fd983630df96f7412/pip-10.0.0b2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-10.0.0b2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1244190,"upload_time_iso_8601":"2018-04-02T13:05:09.976830Z","url":"https://files.pythonhosted.org/packages/32/67/572f642e6e42c580d3154964cfbab7d9322c23b0f417c6c01fdd206a2777/pip-10.0.0b2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"10.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/10.0.1/","requires_dist":["pytest; extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","freezegun; extra == 'testing'"],"requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"10.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-10.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1307639,"upload_time_iso_8601":"2018-04-19T18:56:05.963596Z","url":"https://files.pythonhosted.org/packages/0f/74/ecd13431bcc456ed390b44c8a6e917c1820365cbebcb6a8974d1cd045ab4/pip-10.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-10.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*","size":1246072,"upload_time_iso_8601":"2018-04-19T18:56:09.474691Z","url":"https://files.pythonhosted.org/packages/ae/e8/2340d46ecadb1692a1e455f13f75e596d4eab3d11a57446f08259dee8f02/pip-10.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"18.0":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/18.0/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"18.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-18.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1307744,"upload_time_iso_8601":"2018-07-22T07:53:50.674612Z","url":"https://files.pythonhosted.org/packages/5f/25/e52d3f31441505a5f3af41213346e5b6c221c9e086a166f3703d2ddaf940/pip-18.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-18.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1249656,"upload_time_iso_8601":"2018-07-22T07:53:57.845525Z","url":"https://files.pythonhosted.org/packages/69/81/52b68d0a4de760a2f1979b0931ba7889202f302072cc7a0d614211bc7579/pip-18.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"18.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/18.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"18.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-18.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1323545,"upload_time_iso_8601":"2018-10-05T11:20:31.340485Z","url":"https://files.pythonhosted.org/packages/c2/d7/90f34cb0d83a6c5631cf71dfe64cc1054598c843a92b400e55675cc2ac37/pip-18.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-18.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1259370,"upload_time_iso_8601":"2018-10-05T11:20:45.301430Z","url":"https://files.pythonhosted.org/packages/45/ae/8a0ad77defb7cc903f09e551d88b443304a9bd6e6f124e75c0fbbf6de8f7/pip-18.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.0":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.0/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1354391,"upload_time_iso_8601":"2019-01-22T19:19:22.546661Z","url":"https://files.pythonhosted.org/packages/60/64/73b729587b6b0d13e690a7c3acd2231ee561e8dd28a58ae1b0409a5a2b20/pip-19.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1321823,"upload_time_iso_8601":"2019-01-22T19:19:27.846004Z","url":"https://files.pythonhosted.org/packages/11/31/c483614095176ddfa06ac99c2af4171375053b270842c7865ca0b4438dc1/pip-19.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.0.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.0.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1354402,"upload_time_iso_8601":"2019-01-23T13:59:13.144195Z","url":"https://files.pythonhosted.org/packages/46/dc/7fd5df840efb3e56c8b4f768793a237ec4ee59891959d6a215d63f727023/pip-19.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1321875,"upload_time_iso_8601":"2019-01-23T13:59:22.244586Z","url":"https://files.pythonhosted.org/packages/c8/89/ad7f27938e59db1f0f55ce214087460f65048626e2226531ba6cb6da15f0/pip-19.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.0.2":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.0.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1356167,"upload_time_iso_8601":"2019-02-09T04:59:31.348369Z","url":"https://files.pythonhosted.org/packages/d7/41/34dd96bd33958e52cb4da2f1bf0818e396514fd4f4725a79199564cd0c20/pip-19.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1324514,"upload_time_iso_8601":"2019-02-09T04:59:38.924352Z","url":"https://files.pythonhosted.org/packages/4c/4d/88bc9413da11702cbbace3ccc51350ae099bb351febae8acc85fec34f9af/pip-19.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.0.3":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.0.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.0.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1353599,"upload_time_iso_8601":"2019-02-20T17:23:18.551296Z","url":"https://files.pythonhosted.org/packages/d8/f3/413bab4ff08e1fc4828dfc59996d721917df8e8583ea85385d51125dceff/pip-19.0.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1324617,"upload_time_iso_8601":"2019-02-20T17:23:25.954544Z","url":"https://files.pythonhosted.org/packages/36/fa/51ca4d57392e2f69397cd6e5af23da2a8d37884a605f9e3f2d3bfdc48397/pip-19.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1361825,"upload_time_iso_8601":"2019-04-24T02:34:04.086417Z","url":"https://files.pythonhosted.org/packages/f9/fb/863012b13912709c13cf5cfdbfb304fa6c727659d6290438e1a88df9d848/pip-19.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1334822,"upload_time_iso_8601":"2019-04-24T02:34:07.121751Z","url":"https://files.pythonhosted.org/packages/51/5f/802a04274843f634469ef299fcd273de4438386deb7b8681dd059f0ee3b7/pip-19.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.1.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.1.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.1.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1360957,"upload_time_iso_8601":"2019-05-06T14:55:05.285246Z","url":"https://files.pythonhosted.org/packages/5c/e0/be401c003291b56efc55aeba6a80ab790d3d4cece2778288d65323009420/pip-19.1.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*","size":1334144,"upload_time_iso_8601":"2019-05-06T14:55:07.864634Z","url":"https://files.pythonhosted.org/packages/93/ab/f86b61bef7ab14909bd7ec3cd2178feb0a1c86d451bc9bccd5a1aedcde5f/pip-19.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.2":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1414682,"upload_time_iso_8601":"2019-07-23T05:23:19.723570Z","url":"https://files.pythonhosted.org/packages/3a/6f/35de4f49ae5c7fdb2b64097ab195020fb48faa8ad3a85386ece6953c11b1/pip-19.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1376993,"upload_time_iso_8601":"2019-07-23T05:23:37.293089Z","url":"https://files.pythonhosted.org/packages/41/13/b6e68eae78405af6e4e9a93319ae5bb371057786f1590b157341f7542d7d/pip-19.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.2.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.2.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.2.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1414720,"upload_time_iso_8601":"2019-07-23T18:42:37.347693Z","url":"https://files.pythonhosted.org/packages/62/ca/94d32a6516ed197a491d17d46595ce58a83cbb2fca280414e57cd86b84dc/pip-19.2.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1376932,"upload_time_iso_8601":"2019-07-23T18:42:47.557630Z","url":"https://files.pythonhosted.org/packages/8b/8a/1b2aadd922db1afe6bc107b03de41d6d37a28a5923383e60695fba24ae81/pip-19.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.2.2":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.2.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.2.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.2.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1414978,"upload_time_iso_8601":"2019-08-11T17:15:34.154082Z","url":"https://files.pythonhosted.org/packages/8d/07/f7d7ced2f97ca3098c16565efbe6b15fafcba53e8d9bdb431e09140514b0/pip-19.2.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.2.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1377264,"upload_time_iso_8601":"2019-08-11T17:15:41.329363Z","url":"https://files.pythonhosted.org/packages/aa/1a/62fb0b95b1572c76dbc3cc31124a8b6866cbe9139eb7659ac7349457cf7c/pip-19.2.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.2.3":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.2.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.2.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.2.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1414986,"upload_time_iso_8601":"2019-08-25T04:37:17.617204Z","url":"https://files.pythonhosted.org/packages/30/db/9e38760b32e3e7f40cce46dd5fb107b8c73840df38f0046d8e6514e675a1/pip-19.2.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.2.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1377284,"upload_time_iso_8601":"2019-08-25T04:37:23.130324Z","url":"https://files.pythonhosted.org/packages/00/9e/4c83a0950d8bdec0b4ca72afd2f9cea92d08eb7c1a768363f2ea458d08b4/pip-19.2.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.3":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1415223,"upload_time_iso_8601":"2019-10-14T14:10:01.358113Z","url":"https://files.pythonhosted.org/packages/4a/08/6ca123073af4ebc4c5488a5bc8a010ac57aa39ce4d3c8a931ad504de4185/pip-19.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1393470,"upload_time_iso_8601":"2019-10-14T14:10:52.024570Z","url":"https://files.pythonhosted.org/packages/af/7a/5dd1e6efc894613c432ce86f1011fcc3bbd8ac07dfeae6393b7b97f1de8b/pip-19.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"19.3.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/19.3.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"19.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-19.3.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1415262,"upload_time_iso_8601":"2019-10-18T08:21:23.319181Z","url":"https://files.pythonhosted.org/packages/00/b6/9cfa56b4081ad13874b0c6f96af8ce16cfbc1cb06bedf8e9164ce5551ec1/pip-19.3.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-19.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1393609,"upload_time_iso_8601":"2019-10-18T08:21:26.646455Z","url":"https://files.pythonhosted.org/packages/ce/ea/9b445176a65ae4ba22dce1d93e4b5fe182f953df71a145f557cffaffc1bf/pip-19.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.0":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.0/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.0","yanked":true},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1518959,"upload_time_iso_8601":"2020-01-21T11:42:56.407994Z","url":"https://files.pythonhosted.org/packages/60/65/16487a7c4e0f95bb3fc89c2e377be331fd496b7a9b08fd3077de7f3ae2cf/pip-20.0-py2.py3-none-any.whl","yanked":true},{"comment_text":"","filename":"pip-20.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1433834,"upload_time_iso_8601":"2020-01-21T11:42:59.282402Z","url":"https://files.pythonhosted.org/packages/8c/5c/c18d58ab5c1a702bf670e0bd6a77cd4645e4aeca021c6118ef850895cc96/pip-20.0.tar.gz","yanked":true}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.0.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.0.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1520463,"upload_time_iso_8601":"2020-01-21T12:43:41.837686Z","url":"https://files.pythonhosted.org/packages/57/36/67f809c135c17ec9b8276466cc57f35b98c240f55c780689ea29fa32f512/pip-20.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1433939,"upload_time_iso_8601":"2020-01-21T12:43:45.550855Z","url":"https://files.pythonhosted.org/packages/28/af/2c76c8aa46ccdf7578b83d97a11a2d1858794d4be4a1610ade0d30182e8b/pip-20.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.0.2":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.0.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1440952,"upload_time_iso_8601":"2020-01-24T14:50:44.419813Z","url":"https://files.pythonhosted.org/packages/54/0c/d01aa759fdc501a58f431eb594a17495f15b88da142ce14b5845662c13f3/pip-20.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1433827,"upload_time_iso_8601":"2020-01-24T14:50:47.350895Z","url":"https://files.pythonhosted.org/packages/8e/76/66066b7bc71817238924c7e4b448abdb17eb0c92d645769c223f9ace478f/pip-20.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1489786,"upload_time_iso_8601":"2020-04-28T16:54:23.232633Z","url":"https://files.pythonhosted.org/packages/54/2e/df11ea7e23e7e761d484ed3740285a34e38548cf2bad2bed3dd5768ec8b9/pip-20.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1474248,"upload_time_iso_8601":"2020-04-28T16:54:25.410325Z","url":"https://files.pythonhosted.org/packages/d1/05/059c78cd5d740d2299266ffa15514dad6692d4694df571bf168e2cdd98fb/pip-20.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.1.1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.1.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.1.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1490666,"upload_time_iso_8601":"2020-05-19T10:40:29.087652Z","url":"https://files.pythonhosted.org/packages/43/84/23ed6a1796480a6f1a2d38f2802901d078266bda38388954d01d3f2e821d/pip-20.1.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1475109,"upload_time_iso_8601":"2020-05-19T10:40:32.181030Z","url":"https://files.pythonhosted.org/packages/08/25/f204a6138dade2f6757b4ae99bc3994aac28a5602c97ddb2a35e0e22fbc4/pip-20.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.1b1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.1b1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.1b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.1b1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1489600,"upload_time_iso_8601":"2020-04-21T02:03:49.220700Z","url":"https://files.pythonhosted.org/packages/ec/05/82d3fababbf462d876883ebc36f030f4fa057a563a80f5a26ee63679d9ea/pip-20.1b1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.1b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1473869,"upload_time_iso_8601":"2020-04-21T02:03:51.598151Z","url":"https://files.pythonhosted.org/packages/cd/81/c1184456fe506bd50992571c9f8581907976ce71502e36741f033e2da1f1/pip-20.1b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1503020,"upload_time_iso_8601":"2020-07-29T03:26:29.143873Z","url":"https://files.pythonhosted.org/packages/36/74/38c2410d688ac7b48afa07d413674afc1f903c1c1f854de51dc8eb2367a5/pip-20.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1494827,"upload_time_iso_8601":"2020-07-29T03:26:32.712055Z","url":"https://files.pythonhosted.org/packages/b9/27/a9007a575c8a8e80c22144fec5df3943fd304dfa791bed44a0130e984803/pip-20.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1503343,"upload_time_iso_8601":"2020-08-04T08:32:01.714780Z","url":"https://files.pythonhosted.org/packages/bd/b1/56a834acdbe23b486dea16aaf4c27ed28eb292695b90d01dff96c96597de/pip-20.2.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1496280,"upload_time_iso_8601":"2020-08-04T08:32:06.719386Z","url":"https://files.pythonhosted.org/packages/68/1a/8cfcf3a8cba0dd0f125927c986b1502f2eed284c63fdfd6797ea74300ae4/pip-20.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1503623,"upload_time_iso_8601":"2020-08-11T12:42:55.398447Z","url":"https://files.pythonhosted.org/packages/5a/4a/39400ff9b36e719bdf8f31c99fe1fa7842a42fa77432e584f707a5080063/pip-20.2.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1496965,"upload_time_iso_8601":"2020-08-11T12:42:58.238777Z","url":"https://files.pythonhosted.org/packages/73/8e/7774190ac616c69194688ffce7c1b2a097749792fea42e390e7ddfdef8bc/pip-20.2.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1503696,"upload_time_iso_8601":"2020-09-08T12:37:09.684306Z","url":"https://files.pythonhosted.org/packages/4e/5f/528232275f6509b1fff703c9280e58951a81abe24640905de621c9f81839/pip-20.2.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1497161,"upload_time_iso_8601":"2020-09-08T12:37:12.595269Z","url":"https://files.pythonhosted.org/packages/59/64/4718738ffbc22d98b5223dbd6c5bb87c476d83a4c71719402935170064c7/pip-20.2.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2.4":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2.4/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2.4-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1504817,"upload_time_iso_8601":"2020-10-17T21:46:13.586634Z","url":"https://files.pythonhosted.org/packages/cb/28/91f26bd088ce8e22169032100d4260614fc3da435025ff389ef1d396a433/pip-20.2.4-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1501159,"upload_time_iso_8601":"2020-10-17T21:46:24.236510Z","url":"https://files.pythonhosted.org/packages/0b/f5/be8e741434a4bf4ce5dbc235aa28ed0666178ea8986ddc10d035023744e6/pip-20.2.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.2b1":{"info":{"author":"The pip developers","author_email":"pypa-dev@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.2b1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.2b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.2b1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1503199,"upload_time_iso_8601":"2020-05-21T10:15:37.149084Z","url":"https://files.pythonhosted.org/packages/fe/3b/0fc5e63eb277d5a50a95ce5c896f742ef243be27382303a4a44dd0197e29/pip-20.2b1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.2b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1486606,"upload_time_iso_8601":"2020-05-21T10:15:40.021202Z","url":"https://files.pythonhosted.org/packages/77/3e/6a1fd8e08a06e3e0f54182c7c937bba3f4e9cf1b26f54946d3915021ea2e/pip-20.2b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1518290,"upload_time_iso_8601":"2020-11-30T12:47:49.797078Z","url":"https://files.pythonhosted.org/packages/55/73/bce122d1ed0217b3c1a3439ab16dfa94bbeabd0d31755fcf907493abf39b/pip-20.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1526391,"upload_time_iso_8601":"2020-11-30T12:47:51.521901Z","url":"https://files.pythonhosted.org/packages/03/41/6da553f689d530bc2c337d2c496a40dc9c0fdc6481e5df1f3ee3b8574479/pip-20.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3.1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1518513,"upload_time_iso_8601":"2020-12-03T09:17:03.800630Z","url":"https://files.pythonhosted.org/packages/ab/11/2dc62c5263d9eb322f2f028f7b56cd9d096bb8988fcf82d65fa2e4057afe/pip-20.3.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1526593,"upload_time_iso_8601":"2020-12-03T09:17:10.407725Z","url":"https://files.pythonhosted.org/packages/cb/5f/ae1eb8bda1cde4952bd12e468ab8a254c345a0189402bf1421457577f4f3/pip-20.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3.2/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3.2","yanked":true},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1521420,"upload_time_iso_8601":"2020-12-15T01:49:02.628447Z","url":"https://files.pythonhosted.org/packages/3d/0c/01014c0442830eb38d6baef0932fdcb389279ce74295350ecb9fe09e048a/pip-20.3.2-py2.py3-none-any.whl","yanked":true},{"comment_text":"","filename":"pip-20.3.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1529758,"upload_time_iso_8601":"2020-12-15T01:49:05.715649Z","url":"https://files.pythonhosted.org/packages/51/63/86e147c44335b03055e58a27c791d94fff4baaf08d67852f925ab9b90240/pip-20.3.2.tar.gz","yanked":true}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3.3/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1520905,"upload_time_iso_8601":"2020-12-15T15:44:25.436666Z","url":"https://files.pythonhosted.org/packages/54/eb/4a3642e971f404d69d4f6fa3885559d67562801b99d7592487f1ecc4e017/pip-20.3.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.3.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1529320,"upload_time_iso_8601":"2020-12-15T15:44:33.842085Z","url":"https://files.pythonhosted.org/packages/ca/1e/d91d7aae44d00cd5001957a1473e4e4b7d1d0f072d1af7c34b5899c9ccdf/pip-20.3.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3.4":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3.4/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3.4-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1522101,"upload_time_iso_8601":"2021-01-23T12:58:09.936803Z","url":"https://files.pythonhosted.org/packages/27/79/8a850fe3496446ff0d584327ae44e7500daf6764ca1a382d2d02789accf7/pip-20.3.4-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.3.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1530646,"upload_time_iso_8601":"2021-01-23T12:58:14.013292Z","url":"https://files.pythonhosted.org/packages/53/7f/55721ad0501a9076dbc354cc8c63ffc2d6f1ef360f49ad0fbcce19d68538/pip-20.3.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"20.3b1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 2","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.5","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/20.3b1/","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","summary":"The PyPA recommended tool for installing Python packages.","version":"20.3b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-20.3b1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1507561,"upload_time_iso_8601":"2020-10-31T19:25:12.450781Z","url":"https://files.pythonhosted.org/packages/fb/46/26d13ba147ba430f9cda0d0cf599a041d142a5c8b1a90ff845ebce7fba0f/pip-20.3b1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-20.3b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*","size":1509954,"upload_time_iso_8601":"2020-10-31T19:25:14.782770Z","url":"https://files.pythonhosted.org/packages/7f/61/2da3c027ad7bd4bc87a3ee7e7160c93e7500dac3536e02ff93008e9b3460/pip-20.3b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.0":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.0/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1538043,"upload_time_iso_8601":"2021-01-23T14:45:47.462636Z","url":"https://files.pythonhosted.org/packages/de/47/58b9f3e6f611dfd17fb8bd9ed3e6f93b7ee662fb85bdfee3565e8979ddf7/pip-21.0-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1548038,"upload_time_iso_8601":"2021-01-23T14:45:50.781349Z","url":"https://files.pythonhosted.org/packages/9e/24/bc928987f35dd0167f21b13a1777c21b9c5917c9894cff93f1c1a6cb8f3b/pip-21.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.0.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"distutils easy_install egg setuptools wheel virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.0.1/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.0.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1539184,"upload_time_iso_8601":"2021-01-30T12:54:11.777084Z","url":"https://files.pythonhosted.org/packages/fe/ef/60d7ba03b5c442309ef42e7d69959f73aacccd0d86008362a681c4698e83/pip-21.0.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1549057,"upload_time_iso_8601":"2021-01-30T12:54:14.269781Z","url":"https://files.pythonhosted.org/packages/b7/2d/ad02de84a4c9fd3b1958dc9fb72764de1aa2605a9d7e943837be6ad82337/pip-21.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.1/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1547115,"upload_time_iso_8601":"2021-04-24T12:58:11.070033Z","url":"https://files.pythonhosted.org/packages/ac/cf/0cc542fc93de2f3b9b53cb979c7d1118cffb93204afb46299a9f858e113f/pip-21.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1552101,"upload_time_iso_8601":"2021-04-24T12:58:13.357715Z","url":"https://files.pythonhosted.org/packages/de/62/77b8b1a9f9c710988e5a58c22a7cd025b63b204df57a6ea939d6d39da421/pip-21.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.1.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.1.1/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.1.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1547644,"upload_time_iso_8601":"2021-04-30T19:05:20.532224Z","url":"https://files.pythonhosted.org/packages/cd/6f/43037c7bcc8bd8ba7c9074256b1a11596daa15555808ec748048c1507f08/pip-21.1.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1552786,"upload_time_iso_8601":"2021-04-30T19:05:23.874136Z","url":"https://files.pythonhosted.org/packages/94/b0/e10bdc8809c81796c80aa3644a8e3dc16594fb1bd68f5996929f26cad980/pip-21.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.1.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.1.2/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.1.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1547997,"upload_time_iso_8601":"2021-05-23T09:52:07.156594Z","url":"https://files.pythonhosted.org/packages/cd/82/04e9aaf603fdbaecb4323b9e723f13c92c245f6ab2902195c53987848c78/pip-21.1.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1553376,"upload_time_iso_8601":"2021-05-23T09:52:09.323049Z","url":"https://files.pythonhosted.org/packages/b1/44/6e26d5296b83c6aac166e48470d57a00d3ed1f642e89adc4a4e412a01643/pip-21.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.1.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.1.3/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.1.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.1.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1548027,"upload_time_iso_8601":"2021-06-26T09:04:01.342020Z","url":"https://files.pythonhosted.org/packages/47/ca/f0d790b6e18b3a6f3bd5e80c2ee4edbb5807286c21cdd0862ca933f751dd/pip-21.1.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.1.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1553596,"upload_time_iso_8601":"2021-06-26T09:04:04.425758Z","url":"https://files.pythonhosted.org/packages/4d/0c/3b63fe024414a8a48661cf04f0993d4b2b8ef92daed45636474c018cd5b7/pip-21.1.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.2/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.2","yanked":true,"yanked_reason":"See https://github.com/pypa/pip/issues/8711"},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1551108,"upload_time_iso_8601":"2021-07-24T13:59:31.798626Z","url":"https://files.pythonhosted.org/packages/03/0f/b125bfdd145c1d018d75ce87603e7e9ff2416e742c71b5ac7deba13ca699/pip-21.2-py3-none-any.whl","yanked":true,"yanked_reason":"See https://github.com/pypa/pip/issues/8711"},{"comment_text":"","filename":"pip-21.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1559742,"upload_time_iso_8601":"2021-07-24T13:59:35.284995Z","url":"https://files.pythonhosted.org/packages/9f/74/0e4d75529e8bf6e594d532a28308a5e369c3f7105e1fec2ff0bf86d478b0/pip-21.2.tar.gz","yanked":true,"yanked_reason":"See https://github.com/pypa/pip/issues/8711"}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.2.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.2.1/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.2.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1551134,"upload_time_iso_8601":"2021-07-25T04:55:59.516587Z","url":"https://files.pythonhosted.org/packages/7c/02/9ab8b431aca1b46fcc1ac830a5870a28a12ba1abfa681904b1d2da876a86/pip-21.2.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1560073,"upload_time_iso_8601":"2021-07-25T04:56:01.888018Z","url":"https://files.pythonhosted.org/packages/f7/ce/e359cf283c0c0f2e0af7df8f16c8d79047aa1887a00a5b39b27d8afc49e2/pip-21.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.2.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.2.2/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.2.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.2.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1562517,"upload_time_iso_8601":"2021-07-31T07:56:27.635721Z","url":"https://files.pythonhosted.org/packages/8a/d7/f505e91e2cdea53cfcf51f4ac478a8cd64fb0bc1042629cedde20d9a6a9b/pip-21.2.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.2.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1571234,"upload_time_iso_8601":"2021-07-31T07:56:30.533132Z","url":"https://files.pythonhosted.org/packages/83/37/3f344e392de7792748ee32e05d7dd6f867eb2166c21c8711280fb30e2128/pip-21.2.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.2.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.2.3/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.2.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.2.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1563443,"upload_time_iso_8601":"2021-08-06T10:50:47.358580Z","url":"https://files.pythonhosted.org/packages/ca/bf/4133a0e05eac641ec270bbcef30512b5ad307d7838adb994acd652cc30e3/pip-21.2.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.2.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1572274,"upload_time_iso_8601":"2021-08-06T10:50:50.395625Z","url":"https://files.pythonhosted.org/packages/e1/63/7c0e553ae0513ebf1858f08030158ff5998324013e0ba4c2e1c00b85df79/pip-21.2.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.2.4":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.2.4/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.2.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.2.4-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1555100,"upload_time_iso_8601":"2021-08-12T14:54:57.870818Z","url":"https://files.pythonhosted.org/packages/ca/31/b88ef447d595963c01060998cb329251648acf4a067721b0452c45527eb8/pip-21.2.4-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.2.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1564487,"upload_time_iso_8601":"2021-08-12T14:55:01.067507Z","url":"https://files.pythonhosted.org/packages/52/e1/06c018197d8151383f66ebf6979d951995cf495629fc54149491f5d157d0/pip-21.2.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.3/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1722980,"upload_time_iso_8601":"2021-10-11T19:42:14.672378Z","url":"https://files.pythonhosted.org/packages/90/a9/1ea3a69a51dcc679724e3512fc2aa1668999eed59976f749134eb02229c8/pip-21.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1730584,"upload_time_iso_8601":"2021-10-11T19:42:19.072885Z","url":"https://files.pythonhosted.org/packages/00/5f/d6959d6f25f202e3e68e3a53b815af42d770c829c19382d0acbf2c3e2112/pip-21.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"21.3.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.6","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/21.3.1/","requires_python":">=3.6","summary":"The PyPA recommended tool for installing Python packages.","version":"21.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-21.3.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.6","size":1723581,"upload_time_iso_8601":"2021-10-22T15:57:09.325883Z","url":"https://files.pythonhosted.org/packages/a4/6d/6463d49a933f547439d6b5b98b46af8742cc03ae83543e4d7688c2420f8b/pip-21.3.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-21.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.6","size":1731517,"upload_time_iso_8601":"2021-10-22T15:57:12.739402Z","url":"https://files.pythonhosted.org/packages/da/f6/c83229dcc3635cdeb51874184241a9508ada15d8baa337a41093fab58011/pip-21.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.0":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.0/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2084231,"upload_time_iso_8601":"2022-01-30T12:34:58.778557Z","url":"https://files.pythonhosted.org/packages/9f/8b/a094f5da22d7abf5098205367b3296dd15b914f4232af5ca39ba6214d08c/pip-22.0-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2054609,"upload_time_iso_8601":"2022-01-30T12:35:02.140472Z","url":"https://files.pythonhosted.org/packages/4a/ca/e72b3b399d7a8cb34311aa8f52924108591c013b09f0268820afb4cd96fb/pip-22.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.0.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.0.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.0.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2084273,"upload_time_iso_8601":"2022-01-30T19:43:48.658738Z","url":"https://files.pythonhosted.org/packages/89/a1/2f4e58eda11e591fbfa518233378835679fc5ab766b690b3df85215014d5/pip-22.0.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2054743,"upload_time_iso_8601":"2022-01-30T19:43:52.632379Z","url":"https://files.pythonhosted.org/packages/63/71/5686e51f06fa59da55f7e81c3101844e57434a30f4a0d7456674d1459841/pip-22.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.0.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.0.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.0.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2084595,"upload_time_iso_8601":"2022-01-30T22:46:51.286060Z","url":"https://files.pythonhosted.org/packages/83/b5/df8640236faa5a3cb80bfafd68e9fb4b22578208b8398c032ccff803f9e0/pip-22.0.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2055167,"upload_time_iso_8601":"2022-01-30T22:46:54.733487Z","url":"https://files.pythonhosted.org/packages/d9/c1/146b24a7648fdf3f8b4dc6521ab0b26ac151ef903bac0b63a4e1450cb4d1/pip-22.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.0.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.0.3/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.0.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2084572,"upload_time_iso_8601":"2022-02-03T08:44:11.473387Z","url":"https://files.pythonhosted.org/packages/6a/df/a6ef77a6574781a668791419ffe366c8acd1c3cf4709d210cb53cd5ce1c2/pip-22.0.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2055359,"upload_time_iso_8601":"2022-02-03T08:44:14.965630Z","url":"https://files.pythonhosted.org/packages/88/d9/761f0b1e0551a3559afe4d34bd9bf68fc8de3292363b3775dda39b62ce84/pip-22.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.0.4":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.0.4/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.0.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.0.4-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2123599,"upload_time_iso_8601":"2022-03-07T07:42:43.295398Z","url":"https://files.pythonhosted.org/packages/4d/16/0a14ca596f30316efd412a60bdfac02a7259bf8673d4d917dc60b9a21812/pip-22.0.4-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.0.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2090742,"upload_time_iso_8601":"2022-03-07T07:42:47.553998Z","url":"https://files.pythonhosted.org/packages/33/c9/e2164122d365d8f823213a53970fa3005eb16218edcfc56ca24cb6deba2b/pip-22.0.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2140586,"upload_time_iso_8601":"2022-05-11T19:59:17.672098Z","url":"https://files.pythonhosted.org/packages/f3/77/23152f90de45957b59591c34dcb39b78194eb67d088d4f8799e9aa9726c4/pip-22.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2111620,"upload_time_iso_8601":"2022-05-11T19:59:22.282550Z","url":"https://files.pythonhosted.org/packages/99/bb/696e256f4f445809f25efd4e4ce42ff99664dc089cafa1e097d5fec7fc33/pip-22.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.1.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.1.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.1.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2140725,"upload_time_iso_8601":"2022-05-21T13:21:05.438247Z","url":"https://files.pythonhosted.org/packages/9b/e6/aa8149e048eda381f2a433599be9b1f5e5e3a189636cd6cf9614aa2ff5be/pip-22.1.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2112307,"upload_time_iso_8601":"2022-05-21T13:21:09.041574Z","url":"https://files.pythonhosted.org/packages/3e/0a/6125e67aa4d3245faeed476e4e26f190b5209f84f01efd733ac6372eb247/pip-22.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.1.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.1.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.1.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2140742,"upload_time_iso_8601":"2022-05-31T11:19:58.344567Z","url":"https://files.pythonhosted.org/packages/96/2f/caec18213f6a67852f6997fb0673ae08d2e93d1b81573edb93ba4ef06970/pip-22.1.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2112549,"upload_time_iso_8601":"2022-05-31T11:20:04.241597Z","url":"https://files.pythonhosted.org/packages/4b/b6/0fa7aa968a9fa4ef63a51b3ff0644e59f49dcd7235b3fd6cceb23f202e08/pip-22.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.1b1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.1b1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.1b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.1b1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2140148,"upload_time_iso_8601":"2022-04-30T13:43:20.029092Z","url":"https://files.pythonhosted.org/packages/79/3a/d341ae105c8b49eac912bee40739d496ae80f9441efa7df6c68f4997bbc8/pip-22.1b1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.1b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2109336,"upload_time_iso_8601":"2022-04-30T13:43:24.685038Z","url":"https://files.pythonhosted.org/packages/a7/c0/794f22836ef3202a7ad61f0872278ee7ac62e8c7617e4c9a08f01b5e82da/pip-22.1b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2044396,"upload_time_iso_8601":"2022-07-21T10:25:38.540179Z","url":"https://files.pythonhosted.org/packages/9b/9e/9e0610f25e65e2cdf90b1ee9c47ca710865401904038558ac0129ea23cbc/pip-22.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2035740,"upload_time_iso_8601":"2022-07-21T10:25:42.288675Z","url":"https://files.pythonhosted.org/packages/cd/b6/cf07132d631444dd7ce0ed199f2327eb34e2418f1675145e5b10e1ee65cd/pip-22.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.2.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.2.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.2.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2044666,"upload_time_iso_8601":"2022-07-27T17:28:27.331945Z","url":"https://files.pythonhosted.org/packages/84/25/5734a44897751d8bac6822efb819acda2d969bcc1b915bbd7d48102952cb/pip-22.2.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2036264,"upload_time_iso_8601":"2022-07-27T17:28:32.273213Z","url":"https://files.pythonhosted.org/packages/46/28/addd7e66bb3af799d35a5dcbb79407b591a7ed674f4efd2bd8f930c40821/pip-22.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.2.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.2.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.2.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.2.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2044706,"upload_time_iso_8601":"2022-08-03T18:56:21.845282Z","url":"https://files.pythonhosted.org/packages/1f/2c/d9626f045e7b49a6225c6b09257861f24da78f4e5f23af2ddbdf852c99b8/pip-22.2.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.2.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2036373,"upload_time_iso_8601":"2022-08-03T18:56:25.739170Z","url":"https://files.pythonhosted.org/packages/4b/30/e15b806597e67057e07a5acdc135216ccbf76a5f1681a324533b61066b0b/pip-22.2.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.3/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2051507,"upload_time_iso_8601":"2022-10-15T11:41:14.898997Z","url":"https://files.pythonhosted.org/packages/47/ef/8b5470b5b94b36231ed9c0bde90caa71c0d4322d4a15f009b2b7f4287fe0/pip-22.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2077961,"upload_time_iso_8601":"2022-10-15T11:41:17.359447Z","url":"https://files.pythonhosted.org/packages/f8/08/7f92782ff571c7c7cb6c5eeb8ebbb1f68cb02bdb24e55c5de4dd9ce98bc3/pip-22.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"22.3.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/22.3.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"22.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-22.3.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2051534,"upload_time_iso_8601":"2022-11-05T15:56:17.843954Z","url":"https://files.pythonhosted.org/packages/09/bd/2410905c76ee14c62baf69e3f4aa780226c1bbfc9485731ad018e35b0cb5/pip-22.3.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-22.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2078129,"upload_time_iso_8601":"2022-11-05T15:56:20.116404Z","url":"https://files.pythonhosted.org/packages/a3/50/c4d2727b99052780aad92c7297465af5fe6eec2dbae490aa9763273ffdc1/pip-22.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.0":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.0/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2056044,"upload_time_iso_8601":"2023-01-30T23:10:52.804072Z","url":"https://files.pythonhosted.org/packages/ab/43/508c403c38eeaa5fc86516eb13bb470ce77601b6d2bbcdb16e26328d0a15/pip-23.0-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2082372,"upload_time_iso_8601":"2023-01-30T23:10:56.760226Z","url":"https://files.pythonhosted.org/packages/b5/16/5e24bf63cff51dcc169f43bd43b86b005c49941e09cc3482a5b370db239e/pip-23.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.0.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.0.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.0.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2055563,"upload_time_iso_8601":"2023-02-17T18:31:51.845190Z","url":"https://files.pythonhosted.org/packages/07/51/2c0959c5adf988c44d9e1e0d940f5b074516ecc87e96b1af25f59de9ba38/pip-23.0.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2082217,"upload_time_iso_8601":"2023-02-17T18:31:56.437559Z","url":"https://files.pythonhosted.org/packages/6b/8b/0b16094553ecc680e43ded8f920c3873b01b1da79a54274c98f08cb29fca/pip-23.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2064542,"upload_time_iso_8601":"2023-04-15T10:52:52.618235Z","url":"https://files.pythonhosted.org/packages/ae/db/a8821cdac455a1740580c92de3ed7b7f257cfdbad8b1ba8864e6abe58a08/pip-23.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2087572,"upload_time_iso_8601":"2023-04-15T10:52:54.763669Z","url":"https://files.pythonhosted.org/packages/da/bf/1bdbe62f5fbde085351693e3a8e387a59f8220932b911b1719fe65efa2d7/pip-23.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.1.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.1.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.1.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2064386,"upload_time_iso_8601":"2023-04-22T09:22:13.255056Z","url":"https://files.pythonhosted.org/packages/f8/f8/17bd3f7c13515523d811ce4104410c16c03e3c6830f9276612e2f4b28382/pip-23.1.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2087384,"upload_time_iso_8601":"2023-04-22T09:22:16.221224Z","url":"https://files.pythonhosted.org/packages/43/7d/1f52f99a7f2eae870483b2c2a3064511487de87911bce146df8a154fbe81/pip-23.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.1.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.1.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.1.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2064688,"upload_time_iso_8601":"2023-04-26T09:23:27.085033Z","url":"https://files.pythonhosted.org/packages/08/e3/57d4c24a050aa0bcca46b2920bff40847db79535dc78141eb83581a52eb8/pip-23.1.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2087568,"upload_time_iso_8601":"2023-04-26T09:23:29.701678Z","url":"https://files.pythonhosted.org/packages/fa/ee/74ff76da0ab649eec7581233daeb43d8aa35383d8f75317b2ab3b80c922f/pip-23.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2085968,"upload_time_iso_8601":"2023-07-15T09:48:20.980926Z","url":"https://files.pythonhosted.org/packages/02/65/f15431ddee78562355ccb39097bf9160a1689f2db40dc418754be98806a1/pip-23.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2109011,"upload_time_iso_8601":"2023-07-15T09:48:23.560233Z","url":"https://files.pythonhosted.org/packages/3d/ab/21fa8d1ecf5648559f056fda732b0f9fca0585eb2688252e67f70e74deaf/pip-23.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.2.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.2.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.2.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.2.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2086091,"upload_time_iso_8601":"2023-07-22T09:17:31.548131Z","url":"https://files.pythonhosted.org/packages/50/c2/e06851e8cc28dcad7c155f4753da8833ac06a5c704c109313b8d5a62968a/pip-23.2.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.2.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2109449,"upload_time_iso_8601":"2023-07-22T09:17:34.056091Z","url":"https://files.pythonhosted.org/packages/ba/19/e63fb4e0d20e48bd2167bb7e857abc0e21679e24805ba921a224df8977c0/pip-23.2.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.3":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.3/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2106643,"upload_time_iso_8601":"2023-10-15T16:24:10.166878Z","url":"https://files.pythonhosted.org/packages/e0/63/b428aaca15fcd98c39b07ca7149e24bc14205ad0f1c80ba2b01835aedde1/pip-23.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2131482,"upload_time_iso_8601":"2023-10-15T16:24:13.549600Z","url":"https://files.pythonhosted.org/packages/0d/f6/07ef4561bb911285c229fa46ed3df1877bd6c5325c4c67d516560d59a6e6/pip-23.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.3.1":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.3.1/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.3.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2107242,"upload_time_iso_8601":"2023-10-21T11:10:25.038576Z","url":"https://files.pythonhosted.org/packages/47/6a/453160888fab7c6a432a6e25f8afe6256d0d9f2cbd25971021da6491d899/pip-23.3.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2132086,"upload_time_iso_8601":"2023-10-21T11:10:27.989450Z","url":"https://files.pythonhosted.org/packages/1f/7f/4da15e07ccd11c84c1ccc8f6e24288d5e76c99441bf80e315b33542db951/pip-23.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"23.3.2":{"info":{"author":"The pip developers","author_email":"distutils-sig@python.org","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/23.3.2/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"23.3.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-23.3.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2109393,"upload_time_iso_8601":"2023-12-17T13:05:02.424947Z","url":"https://files.pythonhosted.org/packages/15/aa/3f4c7bcee2057a76562a5b33ecbd199be08cdb4443a02e26bd2c3cf6fc39/pip-23.3.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-23.3.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2132244,"upload_time_iso_8601":"2023-12-17T13:05:07.339911Z","url":"https://files.pythonhosted.org/packages/b7/06/6b1ad0ae8f97d7a0d6f6ad640db10780578999e647a9593512ceb6f06469/pip-23.3.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.0":{"info":{"author":"","author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.7","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","download_url":"","home_page":"","keywords":"","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.0/","requires_python":">=3.7","summary":"The PyPA recommended tool for installing Python packages.","version":"24.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.7","size":2110226,"upload_time_iso_8601":"2024-02-03T09:53:09.575683Z","url":"https://files.pythonhosted.org/packages/8a/6a/19e9fe04fca059ccf770861c7d5721ab4c2aebc539889e97c7977528a53b/pip-24.0-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.7","size":2132709,"upload_time_iso_8601":"2024-02-03T09:53:18.999959Z","url":"https://files.pythonhosted.org/packages/94/59/6638090c25e9bc4ce0c42817b5a234e183872a1129735a9330c472cc2056/pip-24.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.1/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1823006,"upload_time_iso_8601":"2024-06-20T22:02:56.470430Z","url":"https://files.pythonhosted.org/packages/25/49/2255373efd193c6fbd97dc22399e9c830a6517a0f02ca77fbc0bd83ac5cc/pip-24.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1924468,"upload_time_iso_8601":"2024-06-20T22:03:00.445084Z","url":"https://files.pythonhosted.org/packages/df/60/7538a9cd4d76829c2f585b73d6e400c833a1769408451c813354c58de6cc/pip-24.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.1.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.1.1/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.1.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1824282,"upload_time_iso_8601":"2024-06-26T20:24:59.507347Z","url":"https://files.pythonhosted.org/packages/f4/ab/e3c039b5ddba9335bd8f82d599eb310de1d2a2db0411b8d804d507405c74/pip-24.1.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1925706,"upload_time_iso_8601":"2024-06-26T20:25:03.522891Z","url":"https://files.pythonhosted.org/packages/c0/d0/9641dc7b05877874c6418f8034ddefc809495e65caa14d38c7551cd114bb/pip-24.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.1.2":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.1.2/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.1.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1824406,"upload_time_iso_8601":"2024-07-07T18:38:49.986140Z","url":"https://files.pythonhosted.org/packages/e7/54/0c1c068542cee73d8863336e974fc881e608d0170f3af15d0c0f28644531/pip-24.1.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1926029,"upload_time_iso_8601":"2024-07-07T18:38:53.386564Z","url":"https://files.pythonhosted.org/packages/12/3d/d899257cace386bebb7bdf8a872d5fe3b935cc6381c3ddb76d3e5d99890d/pip-24.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.1b1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.1b1/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.1b1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.1b1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1891289,"upload_time_iso_8601":"2024-05-06T20:49:04.753442Z","url":"https://files.pythonhosted.org/packages/1e/65/22725f8ba583376d0c300c3b9b52b9a67cfd93d786a80be73c167e45abc8/pip-24.1b1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.1b1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1986051,"upload_time_iso_8601":"2024-05-06T20:49:10.123215Z","url":"https://files.pythonhosted.org/packages/71/38/b0cb3d68b4776b6208a2f16b6d444a848a1fe465a78ce4b7dbbeb8a4fc58/pip-24.1b1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.1b2":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.1b2/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.1b2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.1b2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1822825,"upload_time_iso_8601":"2024-06-12T06:38:33.056945Z","url":"https://files.pythonhosted.org/packages/c1/64/0f1528ed3dfd75a56e084caab3c8dbed596bf87a1dfc40cbc57166bb0c25/pip-24.1b2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.1b2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1924362,"upload_time_iso_8601":"2024-06-12T06:38:43.188646Z","url":"https://files.pythonhosted.org/packages/0b/b2/1d1eac32a16fd9478fb9bc6eb6b899f91e6fecceba194fa097c35d385e9a/pip-24.1b2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.2":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.2/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1815170,"upload_time_iso_8601":"2024-07-28T22:40:52.861835Z","url":"https://files.pythonhosted.org/packages/d4/55/90db48d85f7689ec6f81c0db0622d704306c5284850383c090e6c7195a5c/pip-24.2-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1922041,"upload_time_iso_8601":"2024-07-28T22:40:55.693563Z","url":"https://files.pythonhosted.org/packages/4d/87/fb90046e096a03aeab235e139436b3fe804cdd447ed2093b0d70eba3f7f8/pip-24.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.3":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.3/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1822108,"upload_time_iso_8601":"2024-10-27T09:45:42.661703Z","url":"https://files.pythonhosted.org/packages/ce/22/4bb91eb040e18eedaba1ba9db41ef909bc73d20023cea09024099909998a/pip-24.3-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1930900,"upload_time_iso_8601":"2024-10-27T09:45:45.833200Z","url":"https://files.pythonhosted.org/packages/a3/63/dca2c8e2dbfbde322386caf6e674f97f46a6f11d496dc96b99594f8ecc33/pip-24.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"24.3.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/24.3.1/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"24.3.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-24.3.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1822182,"upload_time_iso_8601":"2024-10-27T18:35:53.067053Z","url":"https://files.pythonhosted.org/packages/ef/7d/500c9ad20238fcfcb4cb9243eede163594d7020ce87bd9610c9e02771876/pip-24.3.1-py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-24.3.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1931073,"upload_time_iso_8601":"2024-10-27T18:35:56.354803Z","url":"https://files.pythonhosted.org/packages/f4/b1/b422acd212ad7eedddaf7981eee6e5de085154ff726459cf2da7c5a184c1/pip-24.3.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.0":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.0/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"25.0","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1841506,"upload_time_iso_8601":"2025-01-26T12:40:39.243036Z","url":"https://files.pythonhosted.org/packages/85/8a/1ddf40be20103bcc605db840e9ade09c8e8c9f920a03e9cfe88eae97a058/pip-25.0-py3-none-any.whl","yanked":false},{"filename":"pip-25.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1950328,"upload_time_iso_8601":"2025-01-26T12:40:41.474210Z","url":"https://files.pythonhosted.org/packages/47/3e/68beeeeb306ea20ffd30b3ed993f531d16cd884ec4f60c9b1e238f69f2af/pip-25.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.0.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.8","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.0.1/","requires_python":">=3.8","summary":"The PyPA recommended tool for installing Python packages.","version":"25.0.1","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.0.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.8","size":1841526,"upload_time_iso_8601":"2025-02-09T17:14:01.463742Z","url":"https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl","yanked":false},{"filename":"pip-25.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.8","size":1950850,"upload_time_iso_8601":"2025-02-09T17:14:04.423315Z","url":"https://files.pythonhosted.org/packages/70/53/b309b4a497b09655cb7e07088966881a57d082f48ac3cb54ea729fd2c6cf/pip-25.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","dynamic":["License-File"],"license":"MIT","license_files":["LICENSE.txt","AUTHORS.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.1/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"25.1","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1824948,"upload_time_iso_8601":"2025-04-26T09:45:33.871057Z","url":"https://files.pythonhosted.org/packages/e0/f0/8a2806114cd36e282823fd4d8e88e3b94dc943c2569c350d0c826a49db38/pip-25.1-py3-none-any.whl","yanked":false},{"filename":"pip-25.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1939624,"upload_time_iso_8601":"2025-04-26T09:45:36.149656Z","url":"https://files.pythonhosted.org/packages/79/67/c06f625e2968c417052b3a4a0eef40656d5d4d44033e57b40ec474af1d28/pip-25.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.1.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","dynamic":["License-File"],"license":"MIT","license_files":["LICENSE.txt","AUTHORS.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.1.1/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"25.1.1","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.1.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1825227,"upload_time_iso_8601":"2025-05-02T15:13:59.102661Z","url":"https://files.pythonhosted.org/packages/29/a2/d40fb2460e883eca5199c62cfc2463fd261f760556ae6290f88488c362c0/pip-25.1.1-py3-none-any.whl","yanked":false},{"filename":"pip-25.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1940155,"upload_time_iso_8601":"2025-05-02T15:14:02.057834Z","url":"https://files.pythonhosted.org/packages/59/de/241caa0ca606f2ec5fe0c1f4261b0465df78d786a38da693864a116c37f4/pip-25.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.2":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.14","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","dynamic":["License-File"],"license_expression":"MIT","license_files":["AUTHORS.txt","LICENSE.txt","src/pip/_vendor/msgpack/COPYING","src/pip/_vendor/cachecontrol/LICENSE.txt","src/pip/_vendor/certifi/LICENSE","src/pip/_vendor/dependency_groups/LICENSE.txt","src/pip/_vendor/distlib/LICENSE.txt","src/pip/_vendor/distro/LICENSE","src/pip/_vendor/idna/LICENSE.md","src/pip/_vendor/packaging/LICENSE","src/pip/_vendor/packaging/LICENSE.APACHE","src/pip/_vendor/packaging/LICENSE.BSD","src/pip/_vendor/pkg_resources/LICENSE","src/pip/_vendor/platformdirs/LICENSE","src/pip/_vendor/pygments/LICENSE","src/pip/_vendor/pyproject_hooks/LICENSE","src/pip/_vendor/requests/LICENSE","src/pip/_vendor/resolvelib/LICENSE","src/pip/_vendor/rich/LICENSE","src/pip/_vendor/tomli/LICENSE","src/pip/_vendor/tomli/LICENSE-HEADER","src/pip/_vendor/tomli_w/LICENSE","src/pip/_vendor/truststore/LICENSE","src/pip/_vendor/urllib3/LICENSE.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.2/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"25.2","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.2-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1752557,"upload_time_iso_8601":"2025-07-30T21:50:13.323040Z","url":"https://files.pythonhosted.org/packages/b7/3f/945ef7ab14dc4f9d7f40288d2df998d1837ee0888ec3659c813487572faa/pip-25.2-py3-none-any.whl","yanked":false},{"filename":"pip-25.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1840021,"upload_time_iso_8601":"2025-07-30T21:50:15.401105Z","url":"https://files.pythonhosted.org/packages/20/16/650289cd3f43d5a2fadfd98c68bd1e1e7f2550a1a5326768cddfbcedb2c5/pip-25.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"25.3":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.14","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license_expression":"MIT","license_files":["AUTHORS.txt","LICENSE.txt","src/pip/_vendor/cachecontrol/LICENSE.txt","src/pip/_vendor/certifi/LICENSE","src/pip/_vendor/dependency_groups/LICENSE.txt","src/pip/_vendor/distlib/LICENSE.txt","src/pip/_vendor/distro/LICENSE","src/pip/_vendor/idna/LICENSE.md","src/pip/_vendor/msgpack/COPYING","src/pip/_vendor/packaging/LICENSE","src/pip/_vendor/packaging/LICENSE.APACHE","src/pip/_vendor/packaging/LICENSE.BSD","src/pip/_vendor/pkg_resources/LICENSE","src/pip/_vendor/platformdirs/LICENSE","src/pip/_vendor/pygments/LICENSE","src/pip/_vendor/pyproject_hooks/LICENSE","src/pip/_vendor/requests/LICENSE","src/pip/_vendor/resolvelib/LICENSE","src/pip/_vendor/rich/LICENSE","src/pip/_vendor/tomli/LICENSE","src/pip/_vendor/tomli_w/LICENSE","src/pip/_vendor/truststore/LICENSE","src/pip/_vendor/urllib3/LICENSE.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/25.3/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"25.3","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-25.3-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1778622,"upload_time_iso_8601":"2025-10-25T00:55:39.247292Z","url":"https://files.pythonhosted.org/packages/44/3c/d717024885424591d5376220b5e836c2d5293ce2011523c9de23ff7bf068/pip-25.3-py3-none-any.whl","yanked":false},{"filename":"pip-25.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1803014,"upload_time_iso_8601":"2025-10-25T00:55:41.394958Z","url":"https://files.pythonhosted.org/packages/fe/6e/74a3f0179a4a73a53d66ce57fdb4de0080a8baa1de0063de206d6167acc2/pip-25.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"26.0":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.14","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license_expression":"MIT","license_files":["AUTHORS.txt","LICENSE.txt","src/pip/_vendor/cachecontrol/LICENSE.txt","src/pip/_vendor/certifi/LICENSE","src/pip/_vendor/dependency_groups/LICENSE.txt","src/pip/_vendor/distlib/LICENSE.txt","src/pip/_vendor/distro/LICENSE","src/pip/_vendor/idna/LICENSE.md","src/pip/_vendor/msgpack/COPYING","src/pip/_vendor/packaging/LICENSE","src/pip/_vendor/packaging/LICENSE.APACHE","src/pip/_vendor/packaging/LICENSE.BSD","src/pip/_vendor/pkg_resources/LICENSE","src/pip/_vendor/platformdirs/LICENSE","src/pip/_vendor/pygments/LICENSE","src/pip/_vendor/pyproject_hooks/LICENSE","src/pip/_vendor/requests/LICENSE","src/pip/_vendor/resolvelib/LICENSE","src/pip/_vendor/rich/LICENSE","src/pip/_vendor/tomli/LICENSE","src/pip/_vendor/tomli_w/LICENSE","src/pip/_vendor/truststore/LICENSE","src/pip/_vendor/urllib3/LICENSE.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/26.0/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"26.0","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-26.0-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1787564,"upload_time_iso_8601":"2026-01-31T01:40:52.252376Z","url":"https://files.pythonhosted.org/packages/69/00/5ac7aa77688ec4d34148b423d34dc0c9bc4febe0d872a9a1ad9860b2f6f1/pip-26.0-py3-none-any.whl","yanked":false},{"filename":"pip-26.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1812654,"upload_time_iso_8601":"2026-01-31T01:40:54.361896Z","url":"https://files.pythonhosted.org/packages/44/c2/65686a7783a7c27a329706207147e82f23c41221ee9ae33128fc331670a0/pip-26.0.tar.gz","yanked":false}],"vulnerabilities":[]},"26.0.1":{"info":{"author_email":"The pip developers ","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3 :: Only","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12","Programming Language :: Python :: 3.13","Programming Language :: Python :: 3.14","Programming Language :: Python :: 3.9","Programming Language :: Python :: Implementation :: CPython","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"text/x-rst","license_expression":"MIT","license_files":["AUTHORS.txt","LICENSE.txt","src/pip/_vendor/cachecontrol/LICENSE.txt","src/pip/_vendor/certifi/LICENSE","src/pip/_vendor/dependency_groups/LICENSE.txt","src/pip/_vendor/distlib/LICENSE.txt","src/pip/_vendor/distro/LICENSE","src/pip/_vendor/idna/LICENSE.md","src/pip/_vendor/msgpack/COPYING","src/pip/_vendor/packaging/LICENSE","src/pip/_vendor/packaging/LICENSE.APACHE","src/pip/_vendor/packaging/LICENSE.BSD","src/pip/_vendor/pkg_resources/LICENSE","src/pip/_vendor/platformdirs/LICENSE","src/pip/_vendor/pygments/LICENSE","src/pip/_vendor/pyproject_hooks/LICENSE","src/pip/_vendor/requests/LICENSE","src/pip/_vendor/resolvelib/LICENSE","src/pip/_vendor/rich/LICENSE","src/pip/_vendor/tomli/LICENSE","src/pip/_vendor/tomli_w/LICENSE","src/pip/_vendor/truststore/LICENSE","src/pip/_vendor/urllib3/LICENSE.txt"],"name":"pip","package_url":"https://pypi.org/project/pip/","project_url":"https://pypi.org/project/pip/","project_urls":{"Changelog":"https://pip.pypa.io/en/stable/news/","Documentation":"https://pip.pypa.io","Homepage":"https://pip.pypa.io/","Source":"https://github.com/pypa/pip"},"release_url":"https://pypi.org/project/pip/26.0.1/","requires_python":">=3.9","summary":"The PyPA recommended tool for installing Python packages.","version":"26.0.1","yanked":false},"last_serial":34060136,"urls":[{"filename":"pip-26.0.1-py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py3","requires_python":">=3.9","size":1787723,"upload_time_iso_8601":"2026-02-05T02:20:16.416911Z","url":"https://files.pythonhosted.org/packages/de/f0/c81e05b613866b76d2d1066490adf1a3dbc4ee9d9c839961c3fc8a6997af/pip-26.0.1-py3-none-any.whl","yanked":false},{"filename":"pip-26.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=3.9","size":1812747,"upload_time_iso_8601":"2026-02-05T02:20:18.702334Z","url":"https://files.pythonhosted.org/packages/48/83/0d7d4e9efe3344b8e2fe25d93be44f64b65364d3c8d7bc6dc90198d5422e/pip-26.0.1.tar.gz","yanked":false}],"vulnerabilities":[]},"6.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1258033,"upload_time_iso_8601":"2014-12-22T16:16:26.467841Z","url":"https://files.pythonhosted.org/packages/dc/7c/21191b5944b917b66e4e4e06d74f668d814b6e8a3ff7acd874479b6f6b3d/pip-6.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1190952,"upload_time_iso_8601":"2014-12-22T16:16:52.995964Z","url":"https://files.pythonhosted.org/packages/38/fd/065c66a88398f240e344fdf496b9707f92d75f88eedc3d10ff847b28a657/pip-6.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.1/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1258374,"upload_time_iso_8601":"2014-12-22T22:53:44.320960Z","url":"https://files.pythonhosted.org/packages/e9/7a/cdbc1a12ed52410d557e48d4646f4543e9e991ff32d2374dc6db849aa617/pip-6.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1191382,"upload_time_iso_8601":"2014-12-22T22:53:56.140799Z","url":"https://files.pythonhosted.org/packages/4d/c3/8675b90cd89b9b222062f4f6c7e9d48b0387f5b35cbf747a74403a883e56/pip-6.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.2/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1258464,"upload_time_iso_8601":"2014-12-23T13:15:08.881892Z","url":"https://files.pythonhosted.org/packages/71/3c/b5a521e5e99cfff091e282231591f21193fd80de079ec5fb8ed9c6614044/pip-6.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1191608,"upload_time_iso_8601":"2014-12-23T13:15:23.432872Z","url":"https://files.pythonhosted.org/packages/4c/5a/f9e8e3de0153282c7cb54a9b991af225536ac914bac858ca664cf883bb3e/pip-6.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.3/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1258585,"upload_time_iso_8601":"2014-12-24T01:16:05.401094Z","url":"https://files.pythonhosted.org/packages/73/cb/3eebf42003791df29219a3dfa1874572aa16114b44c9b1b0ac66bf96e8c0/pip-6.0.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1191776,"upload_time_iso_8601":"2014-12-24T01:16:16.302066Z","url":"https://files.pythonhosted.org/packages/ce/63/8d99ae60d11ae1a65f5d4fc39a529a598bd3b8e067132210cb0c4d9e9f74/pip-6.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.4":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.4/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.4","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.4-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1260725,"upload_time_iso_8601":"2015-01-03T06:49:44.714070Z","url":"https://files.pythonhosted.org/packages/c5/0e/c974206726542bc495fc7443dd97834a6d14c2f0cba183fcfcd01075225a/pip-6.0.4-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.4.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1193816,"upload_time_iso_8601":"2015-01-03T06:49:58.026251Z","url":"https://files.pythonhosted.org/packages/02/a1/c90f19910ee153d7a0efca7216758121118d7e93084276541383fe9ca82e/pip-6.0.4.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.5":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.5/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.5","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.5-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1260813,"upload_time_iso_8601":"2015-01-03T08:08:06.280933Z","url":"https://files.pythonhosted.org/packages/e9/1b/c6a375a337fb576784cdea3700f6c3eaf1420f0a01458e6e034cc178a84a/pip-6.0.5-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.5.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1193928,"upload_time_iso_8601":"2015-01-03T08:08:16.335484Z","url":"https://files.pythonhosted.org/packages/19/f2/58628768f618c8c9fea878e0fb97730c0b8a838d3ab3f325768bf12dac94/pip-6.0.5.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.6":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.6/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.6","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.6-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1260783,"upload_time_iso_8601":"2015-01-03T09:32:41.561414Z","url":"https://files.pythonhosted.org/packages/64/fc/4a49ccb18f55a0ceeb76e8d554bd4563217117492997825d194ed0017cc1/pip-6.0.6-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.6.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1193930,"upload_time_iso_8601":"2015-01-03T09:32:52.504452Z","url":"https://files.pythonhosted.org/packages/f6/ce/d9e4e178b66c766c117f62ddf4fece019ef9d50127a8926d2f60300d615e/pip-6.0.6.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.7":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.7/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.7","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.7-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1263429,"upload_time_iso_8601":"2015-01-28T21:42:09.190813Z","url":"https://files.pythonhosted.org/packages/7a/8e/2bbd4fcf3ee06ee90ded5f39ec12f53165dfdb9ef25a981717ad38a16670/pip-6.0.7-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.7.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1196938,"upload_time_iso_8601":"2015-01-28T21:42:18.508628Z","url":"https://files.pythonhosted.org/packages/52/85/b160ebdaa84378df6bb0176d4eed9f57edca662446174eead7a9e2e566d6/pip-6.0.7.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.0.8":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.0.8/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.0.8","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.0.8-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1266491,"upload_time_iso_8601":"2015-02-05T02:28:50.866282Z","url":"https://files.pythonhosted.org/packages/63/65/55b71647adec1ad595bf0e5d76d028506dfc002df30c256f022ff7a660a5/pip-6.0.8-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.0.8.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1200024,"upload_time_iso_8601":"2015-02-05T02:29:00.595772Z","url":"https://files.pythonhosted.org/packages/ef/8a/e3a980bc0a7f791d72c1302f65763ed300f2e14c907ac033e01b44c79e5e/pip-6.0.8.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.1.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.1.0/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.1.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.1.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1117902,"upload_time_iso_8601":"2015-04-07T04:48:48.874789Z","url":"https://files.pythonhosted.org/packages/24/fb/8a56a46243514681e569bbafd8146fa383476c4b7c725c8598c452366f31/pip-6.1.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.1.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1051117,"upload_time_iso_8601":"2015-04-07T04:48:58.958624Z","url":"https://files.pythonhosted.org/packages/6c/84/432eb60bbcb414b9cdfcb135d5f4925e253c74e7d6916ada79990d6cc1a0/pip-6.1.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"6.1.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/6.1.1/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"6.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-6.1.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1117916,"upload_time_iso_8601":"2015-04-07T10:43:14.524332Z","url":"https://files.pythonhosted.org/packages/67/f0/ba0fb41dbdbfc4aa3e0c16b40269aca6b9e3d59cacdb646218aa2e9b1d2c/pip-6.1.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-6.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1051205,"upload_time_iso_8601":"2015-04-07T10:43:26.042225Z","url":"https://files.pythonhosted.org/packages/bf/85/871c126b50b8ee0b9819e8a63b614aedd264577e73478caedcd447e8f28c/pip-6.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.0.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.0.0/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.0.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.0.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1118091,"upload_time_iso_8601":"2015-05-22T02:59:59.774370Z","url":"https://files.pythonhosted.org/packages/5a/9b/56d3c18d0784d5f2bbd446ea2dc7ffa7476c35e3dc223741d20cfee3b185/pip-7.0.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.0.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1053302,"upload_time_iso_8601":"2015-05-22T03:00:11.819399Z","url":"https://files.pythonhosted.org/packages/c6/16/6475b142927ca5d03e3b7968efa5b0edd103e4684ecfde181a25f6fa2505/pip-7.0.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.0.1/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1118215,"upload_time_iso_8601":"2015-05-23T00:18:07.637408Z","url":"https://files.pythonhosted.org/packages/5a/10/bb7a32c335bceba636aa673a4c977effa1e73a79f88856459486d8d670cf/pip-7.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1053513,"upload_time_iso_8601":"2015-05-23T00:18:19.529004Z","url":"https://files.pythonhosted.org/packages/4a/83/9ae4362a80739657e0c8bb628ea3fa0214a9aba7c8590dacc301ea293f73/pip-7.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.0.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.0.2/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1118531,"upload_time_iso_8601":"2015-06-01T23:38:59.844548Z","url":"https://files.pythonhosted.org/packages/64/7f/7107800ae0919a80afbf1ecba21b90890431c3ee79d700adac3c79cb6497/pip-7.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1054071,"upload_time_iso_8601":"2015-06-01T23:39:13.056904Z","url":"https://files.pythonhosted.org/packages/75/b1/66532c273bca0133e42c3b4540a1609289f16e3046f1830f18c60794d661/pip-7.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.0.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.0.3/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.0.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1118548,"upload_time_iso_8601":"2015-06-02T01:30:16.135291Z","url":"https://files.pythonhosted.org/packages/96/76/33a598ae42dd0554207d83c7acc60e3b166dbde723cbf282f1f73b7a127c/pip-7.0.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1054215,"upload_time_iso_8601":"2015-06-02T01:30:30.679685Z","url":"https://files.pythonhosted.org/packages/35/59/5b23115758ba0f2fc465c459611865173ef006202ba83f662d1f58ed2fb8/pip-7.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.1.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.1.0/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.1.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.1.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1111835,"upload_time_iso_8601":"2015-06-30T23:12:13.357882Z","url":"https://files.pythonhosted.org/packages/f7/c0/9f8dac88326609b4b12b304e8382f64f7d5af7735a00d2fac36cf135fc30/pip-7.1.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.1.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1049267,"upload_time_iso_8601":"2015-06-30T23:12:17.953147Z","url":"https://files.pythonhosted.org/packages/7e/71/3c6ece07a9a885650aa6607b0ebfdf6fc9a3ef8691c44b5e724e4eee7bf2/pip-7.1.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.1.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.1.1/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.1.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1111330,"upload_time_iso_8601":"2015-08-20T21:26:04.556203Z","url":"https://files.pythonhosted.org/packages/1c/56/094d563c508917081bccff365e4f621ba33073c1c13aca9267a43cfcaf13/pip-7.1.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1049099,"upload_time_iso_8601":"2015-08-20T21:26:12.387000Z","url":"https://files.pythonhosted.org/packages/3b/bb/b3f2a95494fd3f01d3b3ae530e7c0e910dc25e88e30787b0a5e10cbc0640/pip-7.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"7.1.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.2","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/7.1.2/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'"],"summary":"The PyPA recommended tool for installing Python packages.","version":"7.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-7.1.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1111358,"upload_time_iso_8601":"2015-08-22T22:48:12.483602Z","url":"https://files.pythonhosted.org/packages/b2/d0/cd115fe345dd6f07ec1c780020a7dfe74966fceeb171e0f20d1d4905b0b7/pip-7.1.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-7.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1049170,"upload_time_iso_8601":"2015-08-22T22:48:23.522680Z","url":"https://files.pythonhosted.org/packages/d0/92/1e8406c15d9372084a5bf79d96da3a0acc4e7fcf0b80020a4820897d2a5c/pip-7.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.0.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.0.0/","requires_dist":["mock; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.0.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.0.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1188709,"upload_time_iso_8601":"2016-01-20T00:41:09.360022Z","url":"https://files.pythonhosted.org/packages/00/ae/bddef02881ee09c6a01a0d6541aa6c75a226a4e68b041be93142befa0cd6/pip-8.0.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.0.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1129857,"upload_time_iso_8601":"2016-01-20T00:43:08.426906Z","url":"https://files.pythonhosted.org/packages/e3/2d/03c014d11e66628abf2fda5ca00f779cbe7b5292c5cd13d42a95b94aa9b8/pip-8.0.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.0.1/","requires_dist":["mock; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1189821,"upload_time_iso_8601":"2016-01-21T19:35:44.204866Z","url":"https://files.pythonhosted.org/packages/45/9c/6f9a24917c860873e2ce7bd95b8f79897524353df51d5d920cd6b6c1ec33/pip-8.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1131239,"upload_time_iso_8601":"2016-01-21T19:35:51.520974Z","url":"https://files.pythonhosted.org/packages/ea/66/a3d6187bd307159fedf8575c0d9ee2294d13b1cdd11673ca812e6a2dda8f/pip-8.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.0.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.0.2/","requires_dist":["mock; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1188805,"upload_time_iso_8601":"2016-01-21T23:49:36.011163Z","url":"https://files.pythonhosted.org/packages/e7/a0/bd35f5f978a5e925953ce02fa0f078a232f0f10fcbe543d8cfc043f74fda/pip-8.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1130183,"upload_time_iso_8601":"2016-01-21T23:49:42.461044Z","url":"https://files.pythonhosted.org/packages/ce/15/ee1f9a84365423e9ef03d0f9ed0eba2fb00ac1fffdd33e7b52aea914d0f8/pip-8.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.0.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.0.3/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.0.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1190016,"upload_time_iso_8601":"2016-02-25T17:19:05.770642Z","url":"https://files.pythonhosted.org/packages/ae/d4/2b127310f5364610b74c28e2e6a40bc19e2d3c9a9a4e012d3e333e767c99/pip-8.0.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1131758,"upload_time_iso_8601":"2016-02-25T17:19:21.542588Z","url":"https://files.pythonhosted.org/packages/22/f3/14bc87a4f6b5ec70b682765978a6f3105bf05b6781fa97e04d30138bd264/pip-8.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.1.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.1.0/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.1.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.1.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1197452,"upload_time_iso_8601":"2016-03-05T16:57:24.463525Z","url":"https://files.pythonhosted.org/packages/1e/c7/78440b3fb882ed001e6e12d8770bd45e73d6eced4e57f7c072b829ce8a3d/pip-8.1.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.1.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1138794,"upload_time_iso_8601":"2016-03-05T16:57:31.730134Z","url":"https://files.pythonhosted.org/packages/3c/72/6981d5adf880adecb066a1a1a4c312a17f8d787a3b85446967964ac66d55/pip-8.1.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.1.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.1.1/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.1.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.1.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1197664,"upload_time_iso_8601":"2016-03-17T13:53:43.930269Z","url":"https://files.pythonhosted.org/packages/31/6a/0f19a7edef6c8e5065f4346137cc2a08e22e141942d66af2e1e72d851462/pip-8.1.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.1.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1139175,"upload_time_iso_8601":"2016-03-17T13:53:50.356327Z","url":"https://files.pythonhosted.org/packages/41/27/9a8d24e1b55bd8c85e4d022da2922cb206f183e2d18fee4e320c9547e751/pip-8.1.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"8.1.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"UNKNOWN","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/8.1.2/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":"","summary":"The PyPA recommended tool for installing Python packages.","version":"8.1.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-8.1.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","size":1198961,"upload_time_iso_8601":"2016-05-11T00:40:59.205444Z","url":"https://files.pythonhosted.org/packages/9c/32/004ce0852e0a127f07f358b715015763273799bd798956fa930814b60f39/pip-8.1.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-8.1.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","size":1140573,"upload_time_iso_8601":"2016-05-11T00:41:13.886195Z","url":"https://files.pythonhosted.org/packages/e7/a8/7556133689add8d1a54c0b14aeff0acb03c64707ce100ecd53934da1aa13/pip-8.1.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"9.0.0":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/9.0.0/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"9.0.0","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-9.0.0-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1254648,"upload_time_iso_8601":"2016-11-02T18:24:13.838119Z","url":"https://files.pythonhosted.org/packages/3f/ef/935d9296acc4f48d1791ee56a73781271dce9712b059b475d3f5fa78487b/pip-9.0.0-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-9.0.0.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1197043,"upload_time_iso_8601":"2016-11-02T18:24:19.320860Z","url":"https://files.pythonhosted.org/packages/5e/53/eaef47e5e2f75677c9de0737acc84b659b78a71c4086f424f55346a341b5/pip-9.0.0.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"9.0.1":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/9.0.1/","requires_dist":["mock; extra == 'testing'","pretend; extra == 'testing'","pytest; extra == 'testing'","scripttest (>=1.3); extra == 'testing'","virtualenv (>=1.10); extra == 'testing'"],"requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"9.0.1","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-9.0.1-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1254803,"upload_time_iso_8601":"2016-11-06T18:51:46.325407Z","url":"https://files.pythonhosted.org/packages/b6/ac/7015eb97dc749283ffdec1c3a88ddb8ae03b8fad0f0e611408f196358da3/pip-9.0.1-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-9.0.1.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1197370,"upload_time_iso_8601":"2016-11-06T18:51:51.469799Z","url":"https://files.pythonhosted.org/packages/11/b6/abcb525026a4be042b486df43905d6893fb04f05aac21c32c638e939e447/pip-9.0.1.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"9.0.2":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/9.0.2/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'"],"requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"9.0.2","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-9.0.2-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1400942,"upload_time_iso_8601":"2018-03-17T03:40:44.170876Z","url":"https://files.pythonhosted.org/packages/e7/f9/e801dcea22886cd513f6bd2e8f7e581bd6f67bb8e8f1cd8e7b92d8539280/pip-9.0.2-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-9.0.2.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1343063,"upload_time_iso_8601":"2018-03-17T03:41:51.929427Z","url":"https://files.pythonhosted.org/packages/e5/8f/3fc66461992dc9e9fcf5e005687d5f676729172dda640df2fd8b597a6da7/pip-9.0.2.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]},"9.0.3":{"info":{"author":"The pip developers","author_email":"python-virtualenv@groups.google.com","classifiers":["Development Status :: 5 - Production/Stable","Intended Audience :: Developers","License :: OSI Approved :: MIT License","Programming Language :: Python :: 2","Programming Language :: Python :: 2.6","Programming Language :: Python :: 2.7","Programming Language :: Python :: 3","Programming Language :: Python :: 3.3","Programming Language :: Python :: 3.4","Programming Language :: Python :: 3.5","Programming Language :: Python :: Implementation :: PyPy","Topic :: Software Development :: Build Tools"],"description_content_type":"","download_url":"","home_page":"https://pip.pypa.io/","keywords":"easy_install distutils setuptools egg virtualenv","license":"MIT","maintainer":"","maintainer_email":"","name":"pip","package_url":"https://pypi.org/project/pip/","platform":"","project_url":"https://pypi.org/project/pip/","project_urls":{"Homepage":"https://pip.pypa.io/"},"release_url":"https://pypi.org/project/pip/9.0.3/","requires_dist":["pytest; extra == 'testing'","virtualenv (>=1.10); extra == 'testing'","scripttest (>=1.3); extra == 'testing'","mock; extra == 'testing'","pretend; extra == 'testing'"],"requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","summary":"The PyPA recommended tool for installing Python packages.","version":"9.0.3","yanked":false},"last_serial":34060136,"urls":[{"comment_text":"","filename":"pip-9.0.3-py2.py3-none-any.whl","has_sig":false,"packagetype":"bdist_wheel","python_version":"py2.py3","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1400985,"upload_time_iso_8601":"2018-03-22T01:09:39.999512Z","url":"https://files.pythonhosted.org/packages/ac/95/a05b56bb975efa78d3557efa36acaf9cf5d2fd0ee0062060493687432e03/pip-9.0.3-py2.py3-none-any.whl","yanked":false},{"comment_text":"","filename":"pip-9.0.3.tar.gz","has_sig":false,"packagetype":"sdist","python_version":"source","requires_python":">=2.6,!=3.0.*,!=3.1.*,!=3.2.*","size":1343076,"upload_time_iso_8601":"2018-03-22T01:09:43.526189Z","url":"https://files.pythonhosted.org/packages/c4/44/e6b8056b6c8f2bfd1445cc9990f478930d8e3459e9dbf5b8e2d2922d64d3/pip-9.0.3.tar.gz","yanked":false}],"vulnerabilities":[{"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","fixed_in":["19.2"],"id":"PYSEC-2020-173","link":"https://osv.dev/vulnerability/PYSEC-2020-173","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572","GHSA-5xp3-jfq3-5q8x"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"PYSEC-2021-437","link":"https://osv.dev/vulnerability/PYSEC-2021-437","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2019-20916"],"details":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","fixed_in":["19.2"],"id":"GHSA-gpvv-69j7-gwj8","link":"https://osv.dev/vulnerability/GHSA-gpvv-69j7-gwj8","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2021-3572"],"details":"A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.","fixed_in":["21.1"],"id":"GHSA-5xp3-jfq3-5q8x","link":"https://osv.dev/vulnerability/GHSA-5xp3-jfq3-5q8x","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2023-5752","CVE-2023-5752","PYSEC-2023-228"],"details":"When installing a package from a Mercurial VCS URL, e.g. `pip install hg+...`, with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the `hg clone` call (e.g. `--config`). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.","fixed_in":["23.3"],"id":"GHSA-mq26-g339-26xf","link":"https://osv.dev/vulnerability/GHSA-mq26-g339-26xf","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2023-5752"],"details":"When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n","fixed_in":["23.3"],"id":"PYSEC-2023-228","link":"https://osv.dev/vulnerability/PYSEC-2023-228","source":"osv","summary":null,"withdrawn":null},{"aliases":["BIT-pip-2025-8869","CVE-2025-8869"],"details":"When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a \"fixed\" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the \"vulnerable\" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.","fixed_in":["25.3"],"id":"GHSA-4xh5-x5gv-qwph","link":"https://osv.dev/vulnerability/GHSA-4xh5-x5gv-qwph","source":"osv","summary":null,"withdrawn":null},{"aliases":["CVE-2026-1703"],"details":"When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.","fixed_in":["26.0"],"id":"GHSA-6vgw-5pg2-w6jp","link":"https://osv.dev/vulnerability/GHSA-6vgw-5pg2-w6jp","source":"osv","summary":null,"withdrawn":null}]}}