Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed.
This is due to a path traversal vulnerability when extracting the .tar.gz
file of the package being scanned, which exists by design in the tarfile.TarFile.extractall
function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall
Upgrade to GuardDog v0.1.5 or more recent.
{ "nvd_published_at": "2022-12-17T00:15:00Z", "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2022-12-02T22:25:25Z" }