Embedded malicious code (backdoor) in pyanxdns package for PyPI



Published: 2022-06-13
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-30882
CWE-ID CWE-506
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
pyanxdns
Web applications / Modules and components for CMS

Vendor Marky Egebäck

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Embedded malicious code (backdoor)

EUVDB-ID: #VU64224

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30882

CWE-ID: CWE-506 - Embedded Malicious Code

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to the application.

The vulnerability exists due to a backdoor issue within the presence of malicious "request" dependency that allows a remote attacker to gain unauthorized access to the application end execute arbitrary code.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

pyanxdns: 0.2


CPE2.3 External links

http://github.com/egeback/pyanxdns/issues/1
http://pypi.org/project/pyanxdns/
http://pypi.doubanio.com/simple/request

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###