[Bug 1189042] [NEW] Shipped distutils enforces insecure uploads to PyPI

anatoly techtonik techtonik at php.net
Sat Jun 8 21:34:28 UTC 2013


*** This bug is a security vulnerability ***

Public security bug reported:

`distutils` module which comes with Python distribution provides way for people to upload their Python packages to PyPI catalog. The URL shipped with distutils uses insecure  HTTP access method, which allows harvesting PyPI passwords through sniffing
over insecure networks (such as public WiFi spots) to be used for malicious uploads.

Changing URL to HTTPS scheme will enable encryption and will protect
PyPI from passive attacks. Checking HTTPS certificates to protect from
active MITM attack is not the scope of this issue.

The CVE number for this issue is assigned, but not disclosed -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1754 And it is
open way for too long - http://bugs.python.org/issue12226 - the fix for
the issue is available, patch is working and should be applied in
Ubuntu.

ProblemType: Bug
DistroRelease: Ubuntu 13.04
Package: python 2.7.4-0ubuntu1
ProcVersionSignature: Ubuntu 3.8.0-23.34-generic 3.8.11
Uname: Linux 3.8.0-23-generic i686
NonfreeKernelModules: nvidia
ApportVersion: 2.9.2-0ubuntu8.1
Architecture: i386
Date: Sun Jun  9 00:18:41 2013
InstallationDate: Installed on 2012-03-12 (453 days ago)
InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Beta i386 (20120301)
MarkForUpload: True
SourcePackage: python-defaults
UpgradeStatus: Upgraded to raring on 2013-04-20 (49 days ago)

** Affects: python-defaults (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: apport-bug i386 raring

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1754

** Summary changed:

- Shipped distutils enforce Insecure uploads to PyPI
+ Shipped distutils enforces insecure uploads to PyPI

** Description changed:

- `distutils` module which comes with Python distribution provides way for
- people to upload their Python packages to PyPI catalog. The URL shipped
- with distutils uses insecure  HTTP access method, which opens PyPI
- passwords  to sniffing PyPI passwords use to upload packages. Such
- passwords can be collected over insecure networks (such as public WiFi
- spots) to be used for malicious uploads.
+ `distutils` module which comes with Python distribution provides way for people to upload their Python packages to PyPI catalog. The URL shipped with distutils uses insecure  HTTP access method, which allows harvesting PyPI passwords through sniffing
+ over insecure networks (such as public WiFi spots) to be used for malicious uploads.
  
  Changing URL to HTTPS scheme will enable encryption and will protect
  PyPI from passive attacks. Checking HTTPS certificates to protect from
  active MITM attack is not the scope of this issue.
  
  The CVE number for this issue is assigned, but not disclosed -
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1754 And it is
  open way for too long - http://bugs.python.org/issue12226 - the fix for
  the issue is available, patch is working and should be applied in
  Ubuntu.
  
  ProblemType: Bug
  DistroRelease: Ubuntu 13.04
  Package: python 2.7.4-0ubuntu1
  ProcVersionSignature: Ubuntu 3.8.0-23.34-generic 3.8.11
  Uname: Linux 3.8.0-23-generic i686
  NonfreeKernelModules: nvidia
  ApportVersion: 2.9.2-0ubuntu8.1
  Architecture: i386
  Date: Sun Jun  9 00:18:41 2013
  InstallationDate: Installed on 2012-03-12 (453 days ago)
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Beta i386 (20120301)
  MarkForUpload: True
  SourcePackage: python-defaults
  UpgradeStatus: Upgraded to raring on 2013-04-20 (49 days ago)

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to python-defaults in Ubuntu.
https://bugs.launchpad.net/bugs/1189042

Title:
  Shipped distutils enforces insecure uploads to PyPI

Status in “python-defaults” package in Ubuntu:
  New

Bug description:
  `distutils` module which comes with Python distribution provides way for people to upload their Python packages to PyPI catalog. The URL shipped with distutils uses insecure  HTTP access method, which allows harvesting PyPI passwords through sniffing
  over insecure networks (such as public WiFi spots) to be used for malicious uploads.

  Changing URL to HTTPS scheme will enable encryption and will protect
  PyPI from passive attacks. Checking HTTPS certificates to protect from
  active MITM attack is not the scope of this issue.

  The CVE number for this issue is assigned, but not disclosed -
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1754 And it is
  open way for too long - http://bugs.python.org/issue12226 - the fix
  for the issue is available, patch is working and should be applied in
  Ubuntu.

  ProblemType: Bug
  DistroRelease: Ubuntu 13.04
  Package: python 2.7.4-0ubuntu1
  ProcVersionSignature: Ubuntu 3.8.0-23.34-generic 3.8.11
  Uname: Linux 3.8.0-23-generic i686
  NonfreeKernelModules: nvidia
  ApportVersion: 2.9.2-0ubuntu8.1
  Architecture: i386
  Date: Sun Jun  9 00:18:41 2013
  InstallationDate: Installed on 2012-03-12 (453 days ago)
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Beta i386 (20120301)
  MarkForUpload: True
  SourcePackage: python-defaults
  UpgradeStatus: Upgraded to raring on 2013-04-20 (49 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-defaults/+bug/1189042/+subscriptions




More information about the foundations-bugs mailing list