MAL-2023-11

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/microsoft_kiota_http/MAL-2023-11.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-11
Published
2023-05-04T00:46:14Z
Modified
2023-05-04T00:46:14Z
Summary
Malicious code in microsoft_kiota_http (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (1aea1a60f074d92d58e8e1644f08af16097bc4fc496a7acc2b60f586ce504017)

The OpenSSF Package Analysis project identified 'microsoftkiotahttp' @ 6.0.1 (rubygems) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2023-06-30T03:53:29.231687801Z",
            "versions": [
                "6.0.1"
            ],
            "source": "ossf-package-analysis",
            "sha256": "1aea1a60f074d92d58e8e1644f08af16097bc4fc496a7acc2b60f586ce504017"
        }
    ]
}
References
Credits

Affected packages

RubyGems / microsoft_kiota_http

Package

Name
microsoft_kiota_http
Purl
pkg:gem/microsoft_kiota_http

Affected ranges

Affected versions

6.*

6.0.1