Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4g82-3jcr-q52w

Опубликовано: 25 мая 2022
Источник: github
Github: Прошло ревью

Описание

Malware in ctx

The ctx hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of os.environ.items() when instantiating Ctx objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at https://anti-theft-web.herokuapp.com.

If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.

Пакеты

Наименование

ctx

pip
Затронутые версииВерсия исправления

<= 0.1.4

Отсутствует

Дефекты

CWE-912

Дефекты

CWE-912