First published: Fri Dec 02 2022(Updated: )
### Impact Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed. This is due to a path traversal vulnerability when extracting the `.tar.gz` file of the package being scanned, which exists by design in the `tarfile.TarFile.extractall` function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall ### Remediation Upgrade to GuardDog v0.1.5 or more recent. ### References * https://semgrep.dev/r?q=trailofbits.python.tarfile-extractall-traversal.tarfile-extractall-traversal * https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html * https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Datadoghq Guarddog | <0.1.5 | |
pip/guarddog | <0.1.5 | 0.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23531 is a vulnerability in the GuardDog CLI tool that allows an attacker to write an arbitrary file on the machine when scanning a specially-crafted local PyPI package.
CVE-2022-23531 has a severity rating of 7.8, which is considered high.
CVE-2022-23531 affects GuardDog versions prior to 0.1.5, allowing for Relative Path Traversal when scanning a specially-crafted local PyPI package.
To fix CVE-2022-23531, you should update GuardDog to version 0.1.5 or newer.
More information about CVE-2022-23531 can be found in the GitHub repository and security advisories for GuardDog.