Malware in ctx
Critical severity
GitHub Reviewed
Published
May 25, 2022
to the GitHub Advisory Database
•
Updated Jan 11, 2023
Description
Published to the GitHub Advisory Database
May 25, 2022
Reviewed
May 25, 2022
Last updated
Jan 11, 2023
The
ctx
hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content ofos.environ.items()
when instantiatingCtx
objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running athttps://anti-theft-web.herokuapp.com
.If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like
AWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.References