PYSEC-2022-199 – ctx
Package
Manager: pip
Name: ctx
Vulnerable Version: =0.1.2-1 || =0.1.2-2 || =0.1.4 || =0.2 || =0.2.1 || =0.2.2 || =0.2.2.1 || =0.2.3 || =0.2.4 || =0.2.5 || =0.2.6 || >=0.1.2-1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
EPSS: N/A pctlN/A
Details
The ctx hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code which collected the content of os.environ.items() when instantiating Ctx objects.
Metadata
Created: 2022-05-24T17:55:00Z
Modified: 2023-11-08T04:24:37.303329Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F159
Auto approve: 1