Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rp2v-v467-q9vq

Опубликовано: 02 дек. 2022
Источник: github
Github: Прошло ревью
CVSS4: 2.3
CVSS3: 5.8

Описание

GuardDog vulnerable to arbitrary file write when scanning a specially-crafted PyPI package

Impact

Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed.

This is due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall

Remediation

Upgrade to GuardDog v0.1.5 or more recent.

References

Пакеты

Наименование

guarddog

pip
Затронутые версииВерсия исправления

< 0.1.5

0.1.5

EPSS

Процентиль: 36%
0.00152
Низкий

2.3 Low

CVSS4

5.8 Medium

CVSS3

Дефекты

CWE-22
CWE-23

Связанные уязвимости

CVSS3: 5.8
nvd
около 3 лет назад

GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.

EPSS

Процентиль: 36%
0.00152
Низкий

2.3 Low

CVSS4

5.8 Medium

CVSS3

Дефекты

CWE-22
CWE-23