Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In pip, multiple configured indexes have equal priority with first-wins on order of configuration (if memory serves); the tiebreaker is the version, so the attacker would need to publish a higher version than the one used internally.

Either way, that’s not the attack described in the post, and is speculative to a degree that doesn’t warrant the “0day” descriptor. It’s also not actionable for companies that run entire PyPI mirrors rather than supplementary indexes, which is the norm.



Knowing the source code would make it easier.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: