You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
GuardDog vulnerable to arbitrary file write when scanning a specially-crafted PyPI package
Low severity
GitHub Reviewed
Published
Nov 29, 2022
in
DataDog/guarddog
•
Updated Nov 18, 2024
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Learn more on MITRE.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as .. that can resolve to a location that is outside of that directory.
Learn more on MITRE.
Impact
Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed.
This is due to a path traversal vulnerability when extracting the
.tar.gz
file of the package being scanned, which exists by design in thetarfile.TarFile.extractall
function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractallRemediation
Upgrade to GuardDog v0.1.5 or more recent.
References
References