MAL-2023-1436

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/puppet-module-posix-system-r3.2/MAL-2023-1436.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1436
Published
2023-08-10T15:30:28Z
Modified
2023-08-10T15:30:28Z
Summary
Malicious code in puppet-module-posix-system-r3.2 (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (835ce606cd37fa823a80a445ab30dce0ec0005af3a78f9ed7a8d35d63db99474)

The OpenSSF Package Analysis project identified 'puppet-module-posix-system-r3.2' @ 1.0.0 (rubygems) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2023-08-10T15:30:28.423349101Z",
            "import_time": "2023-08-10T15:34:14.773936904Z",
            "versions": [
                "1.0.0"
            ],
            "source": "ossf-package-analysis",
            "sha256": "835ce606cd37fa823a80a445ab30dce0ec0005af3a78f9ed7a8d35d63db99474"
        }
    ]
}
References
Credits

Affected packages

RubyGems / puppet-module-posix-system-r3.2

Package

Name
puppet-module-posix-system-r3.2
Purl
pkg:gem/puppet-module-posix-system-r3.2

Affected ranges

Affected versions

1.*

1.0.0