Impact
GuardDog is a command‑line utility that inspects PyPI packages for malicious content. In versions earlier than 2.7.1 its safe_extract() routine extracts ZIP archives without checking the size of the decompressed payload. An attacker can embed a zip bomb—a few megabytes of compressed data that expands to many gigabytes—inside a malicious package. The extraction process consumes vast amounts of disk space, potentially exhausting the file system and causing a denial of service.
Affected Systems
DataDog’s GuardDog tool, used by developers or CI pipelines, is affected. Any installation of GuardDog with a version earlier than 2.7.1 is vulnerable. The issue has been fixed in release 2.7.1, so only customers running older versions are at risk.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.1, indicating a considerable severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely but not impossible, and it is not listed in CISA’s KEV catalog. Attackers would need to supply a crafted PyPI package to a user running GuardDog, so the vector is local or during package ingestion. If successful, the attacker can flood the host with disk usage, leading to service interruption.
OpenCVE Enrichment
Github GHSA