You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm a Cyber Security researcher and developer of PackjGuard [1] to address open-source software supply chain attacks.
Issue
During my research, I found that this repo is vulnerable to attack due to deleted dependency from the public PyPI registry.
Details
Specifically, file https://github.com/msetzu/triplex/blob/d1411302cc606a494509f23081f736d69ecaf691/requirements.txt lists Execution-Time as one of the dependencies. However, it has been deleted from public PyPI. As such, an external bad actor can claim that name and register a malicious package, which will be then installed with pip install command, resulting in arbitrary remote code execution.
Impact
Not only your apps/services using https://github.com/msetzu/triplex repo code are vulnerable to this attack, but the users of your open-source Github repo could also fall victim.
Please manually register a placeholder Execution-Time package on PyPI immediately or remove Execution-Time dependency from https://github.com/msetzu/triplex/blob/d1411302cc606a494509f23081f736d69ecaf691/requirements.txt to fix this vulnerability.
To automatically fix such issues in future, please install PackjGuard Github app [1].
Thanks!
PackjGuard is a Github app that monitors your repos 24x7, detects vulnerable/malicious/risky open-source dependencies, and creates pull requests for auto remediation: https://github.com/marketplace/packjguard
The text was updated successfully, but these errors were encountered:
I'm a Cyber Security researcher and developer of PackjGuard [1] to address open-source software supply chain attacks.
Issue
During my research, I found that this repo is vulnerable to attack due to deleted dependency from the public PyPI registry.
Details
Specifically, file
https://github.com/msetzu/triplex/blob/d1411302cc606a494509f23081f736d69ecaf691/requirements.txt
listsExecution-Time
as one of the dependencies. However, it has been deleted from public PyPI. As such, an external bad actor can claim that name and register a malicious package, which will be then installed withpip install
command, resulting in arbitrary remote code execution.Impact
Not only your apps/services using
https://github.com/msetzu/triplex
repo code are vulnerable to this attack, but the users of your open-source Github repo could also fall victim.You could read more about such attacks here: https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
Remediation
Please manually register a placeholder
Execution-Time
package on PyPI immediately or removeExecution-Time
dependency fromhttps://github.com/msetzu/triplex/blob/d1411302cc606a494509f23081f736d69ecaf691/requirements.txt
to fix this vulnerability.To automatically fix such issues in future, please install PackjGuard Github app [1].
Thanks!
The text was updated successfully, but these errors were encountered: