CVE-2022-23531

Source
https://cve.org/CVERecord?id=CVE-2022-23531
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23531.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-23531
Aliases
Published
2022-12-16T23:41:15.078Z
Modified
2026-02-20T06:26:12.056324Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L CVSS Calculator
Summary
Arbitrary file write when scanning a specially-crafted local PyPI package
Details

GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23531.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-23"
    ]
}
References

Affected packages

Git / github.com/datadog/guarddog

Affected ranges

Type
GIT
Repo
https://github.com/datadog/guarddog
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.0.1
v0.0.2
v0.0.3
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23531.json"