MAL-2023-1427

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/i18n_sonder/MAL-2023-1427.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1427
Published
2023-05-15T02:16:34Z
Modified
2023-05-15T02:16:34Z
Summary
Malicious code in i18n_sonder (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (9f0c939067907bb4e3bd0d91530b128f2ffe8c595d619eaa3ab544891de51e2b)

The OpenSSF Package Analysis project identified 'i18n_sonder' @ 4.1.0 (rubygems) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2023-05-15T02:16:34.040756503Z",
            "import_time": "2023-08-10T06:15:56.51851636Z",
            "versions": [
                "4.1.0"
            ],
            "source": "ossf-package-analysis",
            "sha256": "9f0c939067907bb4e3bd0d91530b128f2ffe8c595d619eaa3ab544891de51e2b"
        }
    ]
}
References
Credits

Affected packages

RubyGems / i18n_sonder

Package

Name
i18n_sonder
Purl
pkg:gem/i18n_sonder

Affected ranges

Affected versions

4.*

4.1.0