MAL-2024-1109

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/cert-orchestration-adapter/MAL-2024-1109.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-1109
Published
2024-03-17T12:16:04Z
Modified
2024-03-17T12:16:04Z
Summary
Malicious code in cert-orchestration-adapter (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (a46ccca932f3d69709f16aef0e3bc3498916b7e0b87a1d69a340ce1d65677dc4)

The OpenSSF Package Analysis project identified 'cert-orchestration-adapter' @ 5.9.1 (pypi) as malicious.

It is considered malicious because:

  • The package communicates with a domain associated with malicious activity.

  • The package executes one or more commands associated with malicious behavior.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2024-03-17T12:16:04Z",
            "import_time": "2024-03-17T12:38:10.082201781Z",
            "versions": [
                "5.9.1"
            ],
            "source": "ossf-package-analysis",
            "sha256": "a46ccca932f3d69709f16aef0e3bc3498916b7e0b87a1d69a340ce1d65677dc4"
        }
    ]
}
References
Credits

Affected packages

PyPI / cert-orchestration-adapter

Package

Name
cert-orchestration-adapter
View open source insights on deps.dev
Purl
pkg:pypi/cert-orchestration-adapter

Affected ranges

Affected versions

5.*

5.9.1