GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.
References
Link | Resource |
---|---|
https://github.com/DataDog/guarddog/releases/tag/v0.1.5 | Release Notes Third Party Advisory |
https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq | Third Party Advisory |
https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-12-16 16:15
Updated : 2022-12-22 06:43
NVD link : CVE-2022-23531
Mitre link : CVE-2022-23531
JSON object : View
CWE
CWE-23
Relative Path Traversal
Products Affected
datadoghq
- guarddog