MAL-2023-8367

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/python-aliyun-sdk-rds/MAL-2023-8367.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-8367
Published
2023-08-16T11:00:03Z
Modified
2023-10-16T05:42:04Z
Summary
Malicious code in python-aliyun-sdk-rds (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: checkmarx (56906386c88b620607253fc1d00a6d5d205c6a535a2ba12fc63108f09761300b)

Malicious Typosquatting packages campaign targeting developers, steals cloud service credentials

Source: google-open-source-security (fad9f833ea9884cd2de7c1e26977adb4c84c650ad954cbfa25b0af0aef09eeee)

Attack targeted at users of Alibaba, AWS and Telegram via malicious packages published to PyPI.

The malicious code was hidden in strategicly chosen functions and would only trigger when these functions were called. The malicious code does not automatically run on install or import, helping the packages evade detection.

References
Credits

Affected packages

PyPI / python-aliyun-sdk-rds

Package

Name
python-aliyun-sdk-rds
View open source insights on deps.dev
Purl
pkg:pypi/python-aliyun-sdk-rds

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected