CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-6345

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00214/1

CVE-2024-6345 allows for remote code execution in pypa/setuptools versions up to 69.1.1. This vulnerability lies within the download functions of the package_index module, making systems vulnerable to code injection. When these functions handle user-supplied URLs, attackers can execute arbitrary commands. Despite the CVSS score of 0, indicating minimal base severity, SOCRadar's Vulnerability Risk Score (SVRS) is 30, suggesting a low level of active exploitation or threat actor interest at this time. The fix is available in setuptools version 70.0. Update immediately to mitigate the risk of unauthorized remote code execution. Exploitation could lead to complete system compromise.

In The Wild
2024-07-15

2024-07-15
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-6345 is a critical vulnerability in pypa/setuptools that allows for remote code execution (RCE) via its download functions. This vulnerability is particularly dangerous as it can be exploited by attackers to execute arbitrary commands on affected systems.

Key Insights:

  • High Severity: The CVSS score of 8.8 indicates that this vulnerability is highly severe and requires immediate attention.
  • SVRS of 0: The SOCRadar Vulnerability Risk Score (SVRS) of 0 suggests that this vulnerability is not currently being actively exploited in the wild. However, it is still critical to patch affected systems as soon as possible to prevent potential exploitation.
  • Active Exploits: There are currently no known active exploits for this vulnerability. However, it is important to note that this could change at any time.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.

Mitigation Strategies:

  • Update setuptools: The most effective mitigation strategy is to update setuptools to version 70.0 or later.
  • Restrict Access: If updating setuptools is not immediately possible, restrict access to the affected functions to prevent attackers from exploiting the vulnerability.
  • Use a Web Application Firewall (WAF): A WAF can help to block malicious requests that attempt to exploit this vulnerability.
  • Monitor for Suspicious Activity: Monitor systems for any suspicious activity that could indicate exploitation of this vulnerability.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-6345 | pypa setuptools up to 69.1.1 package_index code injection (Nessus ID 207922)
vuldb.com2025-03-18
CVE-2024-6345 | pypa setuptools up to 69.1.1 package_index code injection (Nessus ID 207922) | A vulnerability has been found in pypa setuptools up to 69.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component package_index. The manipulation leads to code injection. This vulnerability is known as CVE-2024-6345. The attack can be launched remotely. There
vuldb.com
rss
forum
news
CVE-2024-6345 | pypa setuptools up to 69.1.1 package_index code injection
vuldb.com2024-07-15
CVE-2024-6345 | pypa setuptools up to 69.1.1 package_index code injection | A vulnerability has been found in pypa setuptools up to 69.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component package_index. The manipulation leads to code injection. This vulnerability is known as CVE-2024-6345. The attack can be launched remotely. There is no exploit
cve-2024-6345
domains
urls
cves

Social Media

#IBMAIX #Python ■ Security Bulletin: AIX is affected by information disclosure (CVE-2023-45803) and arbitrary code execution (CVE-2024-6345) due to Python https://t.co/Zi8EGI5xMR
0
0
0
🗣 Security Flaw CVE-2024-6345 in Setuptools Exposes Python Projects to RCE https://t.co/QZh2d4pc4K #security #cybernews #cybersecurity #fridaysecurity #linkedin #twitter #telegram
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0
[email protected]https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5

CWE Details

CWE IDCWE NameDescription
CWE-94Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence