
Cloud Vulnerability DB
A community-led vulnerabilities database
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor was implemented through the democritus-csv package. The vulnerability was discovered and disclosed on October 11, 2022, affecting version 0.1.0 of the d8s-ip-addresses package (NVD, MITRE).
The vulnerability was identified in version 0.1.0 of the d8s-ip-addresses Python package. The backdoor mechanism was implemented through a malicious dependency package named democritus-csv, which could be successfully installed using the command 'pip install d8s-ip-addresses==0.1.0'. This allowed potential attackers to upload democritus-csv packages containing arbitrary malicious code (GitHub Issue).
The vulnerability could allow attackers to execute arbitrary malicious code through the compromised package. This poses a significant security risk as it could lead to unauthorized code execution in systems that have installed the affected version of the package (NVD).
Users should avoid using version 0.1.0 of the d8s-ip-addresses package. The recommendation is to remove this version from systems where it may be installed and ensure that newer, unaffected versions are used instead (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."