setuptools@0.9.4 vulnerabilities

Easily download, build, install, upgrade, and uninstall Python packages

Direct Vulnerabilities

Known vulnerabilities in the setuptools package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Control of Generation of Code ('Code Injection')

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') through the package_index module's download functions due to the unsafe usage of os.system. An attacker can execute arbitrary commands on the system by providing malicious URLs or manipulating the URLs retrieved from package index servers.

Note

Because easy_install and package_index are deprecated, the exploitation surface is reduced, but it's conceivable through social engineering or minor compromise to a package index could grant remote access.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade setuptools to version 70.0.0 or higher.

[,70.0.0)
  • M
Regular Expression Denial of Service (ReDoS)

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTML package or custom PackageIndex page.

Note:

Only a small portion of the user base is impacted by this flaw. Setuptools maintainers pointed out that package_index is deprecated (not formally, but “in spirit”) and the vulnerability isn't reachable through standard, recommended workflows.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade setuptools to version 65.5.1 or higher.

[,65.5.1)
  • M
Directory Traversal

Affected versions of setuptools are vulnerable to Directory Traversal.

ez_setup._extractall() doesn't validate the tar file members. member.name can start with / or to contain / which malicious attacker can exploit to Directory Traversal attacks.

How to fix Directory Traversal?

Upgrade setuptools to version 3.0 or higher.

[,3.0)
  • M
Man-in-the-Middle (MitM)

Affected versions of setuptools are vulnerable to Man-in-the-Middle (MitM) attack.

The ssl.match_hostname function does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate. (same as CVE-2013-7440).

How to fix Man-in-the-Middle (MitM)?

Upgrade setuptools to version 1.3 or higher.

[,1.3)
  • M
Denial of Service (DoS)

Affected versions of setuptools are vulnerable to Denial of Service (DoS) attacks.

Algorithmic complexity vulnerability in the ssl.match_hostname function, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.(same issue as CVE-2013-2099).

How to fix Denial of Service (DoS)?

Upgrade setuptools to version 0.9.5 or higher.

[,0.9.5)