You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
exotel v0.1.6 downloads a malicious windows binary when setup.py is called with "install".
Unfortunately we didn't execute the malicious payload which would have called out to the domain "linkedopports[.]com" because it called the "bdist" step to create a wheel, and then installed the wheel:
Install succeeded:
Collecting exotel==0.1.6
Downloading exotel-0.1.6.tar.gz (2.2 kB)
Building wheels for collected packages: exotel
Building wheel for exotel (setup.py): started
Building wheel for exotel (setup.py): finished with status 'done'
Created wheel for exotel: filename=exotel-0.1.6-py3-none-any.whl size=1790 sha256=de7e1ccfae5d769d08346ca1091f41ff3cc753063a58240008ef9d94c0527c43
Stored in directory: /root/.cache/pip/wheels/c6/1e/3e/71d3147d5a3a8d82f51ee372046a92751b1dfa20432f29c144
Successfully built exotel
Installing collected packages: exotel
Successfully installed exotel-0.1.6
exotel v0.1.6 downloads a malicious windows binary when setup.py is called with "install".
Unfortunately we didn't execute the malicious payload which would have called out to the domain "linkedopports[.]com" because it called the "bdist" step to create a wheel, and then installed the wheel:
The setup.py contained the following:
Refs: https://storage.googleapis.com/ossf-malware-analysis-results/pypi/exotel/0.1.6.json, https://osv.dev/vulnerability/GHSA-cv6j-9835-p7fh
The text was updated successfully, but these errors were encountered: