MAL-2023-1423

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/att-codekit/MAL-2023-1423.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1423
Published
2023-06-19T11:50:49Z
Modified
2023-06-19T11:50:49Z
Summary
Malicious code in att-codekit (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (004ba0a87bf93fad7e23fc134ea62c1fad90d2917fff3ad6ca64a87adf16f69d)

The OpenSSF Package Analysis project identified 'att-codekit' @ 5.1.0 (rubygems) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2023-06-19T11:50:49.866241173Z",
            "import_time": "2023-08-10T06:16:15.319549182Z",
            "versions": [
                "5.1.0"
            ],
            "source": "ossf-package-analysis",
            "sha256": "004ba0a87bf93fad7e23fc134ea62c1fad90d2917fff3ad6ca64a87adf16f69d"
        }
    ]
}
References
Credits

Affected packages

RubyGems / att-codekit

Package

Name
att-codekit
Purl
pkg:gem/att-codekit

Affected ranges

Affected versions

5.*

5.1.0