You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm a Cyber Security researcher and developer of PackjGuard [1] to address open-source software supply chain attacks.
Issue
During my research, I found that this repo is vulnerable to attack due to deleted dependency from the public PyPI registry.
Details
Specifically, file https://github.com/WH1T3-E4GL3/white-obfuscate/blob/a850ef93e43bf72267add6576ff7f6aff8ec2b13/requirements.txt lists sinchsms as one of the dependencies. However, it has been deleted from public PyPI. As such, an external bad actor can claim that name and register a malicious package, which will be then installed with pip install command, resulting in arbitrary remote code execution.
Impact
Not only your apps/services using https://github.com/WH1T3-E4GL3/white-obfuscate repo code are vulnerable to this attack, but the users of your open-source Github repo could also fall victim.
Please manually register a placeholder sinchsms package on PyPI immediately or remove sinchsms dependency from https://github.com/WH1T3-E4GL3/white-obfuscate/blob/a850ef93e43bf72267add6576ff7f6aff8ec2b13/requirements.txt to fix this vulnerability.
To automatically fix such issues in future, please install PackjGuard Github app [1].
Thanks!
PackjGuard is a Github app that monitors your repos 24x7, detects vulnerable/malicious/risky open-source dependencies, and creates pull requests for auto remediation: https://github.com/marketplace/packjguard
The text was updated successfully, but these errors were encountered:
I'm a Cyber Security researcher and developer of PackjGuard [1] to address open-source software supply chain attacks.
Issue
During my research, I found that this repo is vulnerable to attack due to deleted dependency from the public PyPI registry.
Details
Specifically, file
https://github.com/WH1T3-E4GL3/white-obfuscate/blob/a850ef93e43bf72267add6576ff7f6aff8ec2b13/requirements.txt
listssinchsms
as one of the dependencies. However, it has been deleted from public PyPI. As such, an external bad actor can claim that name and register a malicious package, which will be then installed withpip install
command, resulting in arbitrary remote code execution.Impact
Not only your apps/services using
https://github.com/WH1T3-E4GL3/white-obfuscate
repo code are vulnerable to this attack, but the users of your open-source Github repo could also fall victim.You could read more about such attacks here: https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
Remediation
Please manually register a placeholder
sinchsms
package on PyPI immediately or removesinchsms
dependency fromhttps://github.com/WH1T3-E4GL3/white-obfuscate/blob/a850ef93e43bf72267add6576ff7f6aff8ec2b13/requirements.txt
to fix this vulnerability.To automatically fix such issues in future, please install PackjGuard Github app [1].
Thanks!
The text was updated successfully, but these errors were encountered: