
Cloud Vulnerability DB
A community-led vulnerabilities database
The d8s-ip-addresses Python package version 0.1.0, as distributed on PyPI, contained a potential code execution backdoor that was inserted by a third party. The vulnerability was discovered on September 15, 2022, and was assigned CVE-2022-40810. The backdoor was implemented through a malicious dependency called democritus-hypothesis package (NVD, GitHub Issue).
The vulnerability was introduced through a malicious third-party package dependency called democritus-hypothesis. The backdoor could be triggered when installing version 0.1.0 of d8s-ip-addresses using the command 'pip install d8s-ip-addresses==0.1.0'. This allowed attackers to potentially upload and execute arbitrary malicious code through the compromised package (GitHub Issue).
The vulnerability allowed attackers to potentially execute arbitrary code on systems where the affected version of the package was installed. This could lead to system compromise and unauthorized access to the affected systems (NVD).
Users should avoid using version 0.1.0 of the d8s-ip-addresses package. The recommendation was to remove version 0.1.0 from PyPI to prevent further installations of the compromised package (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."