Skip to content

Malware in ctx

Critical severity GitHub Reviewed Published May 25, 2022 to the GitHub Advisory Database • Updated Jan 11, 2023

Package

pip ctx (pip)

Affected versions

<= 0.1.4

Patched versions

None

Description

The ctx hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of os.environ.items() when instantiating Ctx objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at https://anti-theft-web.herokuapp.com.

If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.

References

Published to the GitHub Advisory Database May 25, 2022
Reviewed May 25, 2022
Last updated Jan 11, 2023

Severity

Critical

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-4g82-3jcr-q52w

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.