Advisories for Pypi/Guarddog package

2022

Relative Path Traversal

GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 is vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in …

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 is vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package. Extracting files using shutil.unpack_archive() from a potentially malicious tarball without validating that the destination file path is within the intended destination directory can cause files outside the destination directory to be overwritten. This issue is patched in version 0.1.8. Potential workarounds include using …

Relative Path Traversal

Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed. This is due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function.