{"id":"PYSEC-2022-42994","details":"GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.","aliases":["CVE-2022-23531","GHSA-rp2v-v467-q9vq"],"modified":"2026-02-20T06:26:12.056324Z","published":"2022-12-17T00:15:00Z","references":[{"type":"WEB","url":"https://github.com/DataDog/guarddog/releases/tag/v0.1.5"},{"type":"ADVISORY","url":"https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq"},{"type":"FIX","url":"https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306"},{"type":"WEB","url":"https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306"}],"affected":[{"package":{"name":"guarddog","ecosystem":"PyPI","purl":"pkg:pypi/guarddog"},"ranges":[{"type":"GIT","repo":"https://github.com/DataDog/guarddog","events":[{"introduced":"0"},{"fixed":"a56aff58264cb6b7855d71b00dc10c39a5dbd306"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.5"}]}],"versions":["0.1.1","0.1.3","0.1.4"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/guarddog/PYSEC-2022-42994.yaml"}}],"schema_version":"1.7.3"}