GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0118 | GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5. |
Github GHSA |
GHSA-rp2v-v467-q9vq | GuardDog vulnerable to arbitrary file write when scanning a specially-crafted PyPI package |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 17 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-17T14:33:54.287Z
Reserved: 2022-01-19T21:23:53.786Z
Link: CVE-2022-23531
Updated: 2024-08-03T03:43:46.507Z
Status : Modified
Published: 2022-12-17T00:15:08.643
Modified: 2024-11-21T06:48:45.477
Link: CVE-2022-23531
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA