Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00ZzgyLTNqY3ItcTUyd84AArNL
Malware in ctx
The ctx
hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of os.environ.items()
when instantiating Ctx
objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at https://anti-theft-web.herokuapp.com
.
If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00ZzgyLTNqY3ItcTUyd84AArNL
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-4g82-3jcr-q52w
References:
- https://github.com/figlief/ctx
- https://isc.sans.edu/forums/diary/ctx+Python+Library+Updated+with+Extra+Features/28678/
- https://portswigger.net/daily-swig/malicious-python-library-ctx-removed-from-pypi-repo
- https://python-security.readthedocs.io/pypi-vuln/index-2022-05-24-ctx-domain-takeover.html
- https://github.com/advisories/GHSA-4g82-3jcr-q52w
Blast Radius: 0.0
Affected Packages
pypi:ctx
Dependent packages: 0Dependent repositories: 14
Downloads: 0
Affected Version Ranges: <= 0.1.4
No known fixed version
All affected versions: 0.1.2