Lucene search

K
githubGitHub Advisory DatabaseGHSA-4G82-3JCR-Q52W
HistoryMay 25, 2022 - 11:09 p.m.

Malware in ctx

2022-05-2523:09:55
CWE-912
GitHub Advisory Database
github.com
24
pypi
ctx
user account compromise
malicious project
environment variables
heroku
sensitive data
passwords
api keys
audit

The ctx hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of os.environ.items() when instantiating Ctx objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at https://anti-theft-web.herokuapp.com.

If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.

Affected configurations

Vulners
Node
ctxRange0.1.4
VendorProductVersionCPE
*ctx*cpe:2.3:a:*:ctx:*:*:*:*:*:*:*:*