Safety vulnerability ID: 54607
The information on this page was manually curated by our Cybersecurity Intelligence Team.
GuardDog versions before 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function.
Latest version: 2.1.0
GuardDog is a CLI tool to Identify malicious PyPI packages
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application