The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Command Injection vulnerabilities in an interactive lesson.
Start learningUpgrade pipenv
to version 2022.1.8 or higher.
pipenv is a Python Development Workflow for Humans.
Affected versions of this package are vulnerable to Arbitrary Command Injection. Due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt
file, which will cause victims who use pipenv
to install the requirements file (e.g. with pipenv install -r requirements.txt
) to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems.
According to the requirements file format specification, any lines which begin with a #
character, and/or any text in a line following a whitespace and a #
character, should be interpreted as a comment which will be ignored during processing of the requirements file.
However, due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt
file, which will cause victims who use pipenv
to install the requirements file
Note: The primary hurdle to successful exploitation of this vulnerability depends on an attacker's ability to surreptitiously insert a specially crafted string into a requirements.txt
file which will be installed by a victim. This is not a highly likely scenario, however it can be made easier to obfuscate due to it being hidden within comments.