CVE-2022-23531

GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.
Configurations

Configuration 1 (hide)

cpe:2.3:a:datadoghq:guarddog:*:*:*:*:*:python:*:*

History

27 Jun 2023, 18:19

Type Values Removed Values Added
CWE CWE-23 CWE-22

Information

Published : 2022-12-17 00:15

Updated : 2024-02-28 19:51


NVD link : CVE-2022-23531

Mitre link : CVE-2022-23531

CVE.ORG link : CVE-2022-23531


JSON object : View

Products Affected

datadoghq

  • guarddog
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal