MAL-2024-10152

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/redis-di-processor/MAL-2024-10152.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2024-10152
Published
2024-08-23T21:20:09Z
Modified
2025-12-12T20:40:28.134352Z
Summary
Malicious code in redis-di-processor (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d6942290379335757f0deff6d17e2490cd1b47f426b3f1fb533766ab804aa6cb)

The package is designed to exfiltrate basic data, like hostname and OS details, as well as collect information about the stacktrace it's imported from.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2024-08-moti-analytics

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2024-10-24T00:57:08.16677585Z",
            "modified_time": "2024-10-16T14:49:48Z",
            "source": "reversing-labs",
            "versions": [
                "0.1.8"
            ],
            "sha256": "8807be7545a5c56b457c5b2b74d367132300b3876c053991c31c906fd9aabff0",
            "id": "RLMA-2024-09114"
        },
        {
            "import_time": "2025-12-02T22:30:56.365110437Z",
            "modified_time": "2024-08-23T21:20:09Z",
            "source": "kam193",
            "sha256": "33706cbb6110242aa641456e01c0b13fd33512ef13286633442b6828f5561205",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2024-08-moti-analytics/redis-di-processor"
        },
        {
            "import_time": "2025-12-02T23:07:19.552458957Z",
            "modified_time": "2024-08-23T21:20:09Z",
            "source": "kam193",
            "sha256": "d6942290379335757f0deff6d17e2490cd1b47f426b3f1fb533766ab804aa6cb",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2024-08-moti-analytics/redis-di-processor"
        },
        {
            "import_time": "2025-12-10T21:38:58.654611042Z",
            "modified_time": "2024-08-23T21:20:09Z",
            "source": "kam193",
            "versions": [
                "0.1.8"
            ],
            "sha256": "ebbd6b1490989148102e50444b4e5143aab85d6958579d5a9c18ffd40b0dcdbd",
            "id": "pypi/2024-08-moti-analytics/redis-di-processor"
        }
    ]
}
References
Credits

Affected packages

PyPI / redis-di-processor

Package

Name
redis-di-processor
View open source insights on deps.dev
Purl
pkg:pypi/redis-di-processor

Affected ranges

Affected versions

0.*

0.1.8

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/redis-di-processor/MAL-2024-10152.json"