GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.
References
Link | Resource |
---|---|
https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306 | Patch Third Party Advisory |
https://github.com/DataDog/guarddog/releases/tag/v0.1.5 | Release Notes Third Party Advisory |
https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq | Third Party Advisory |
Configurations
History
27 Jun 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 |
Information
Published : 2022-12-17 00:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-23531
Mitre link : CVE-2022-23531
CVE.ORG link : CVE-2022-23531
JSON object : View
Products Affected
datadoghq
- guarddog