Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

French postal and banking services disrupted by suspected DDoS attack

Inside Uzbekistan’s nationwide license plate monitoring system

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
Identity

Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

userBy userNovember 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 28, 2025Ravi LakshmananMalware/vulnerabilities

Cybersecurity researchers have discovered vulnerable code in a legacy Python package that could pave the way for a supply chain compromise of the Python Package Index (PyPI) through domain takeover attacks.

Software supply chain security company ReversingLabs announced that it has discovered a “vulnerability” in a bootstrap file provided by a build and deployment automation tool named zc.buildout.

“The script automates the process of downloading, building, and installing the necessary libraries and tools,” said security researcher Vladimir Pezo. Specifically, when the bootstrap script runs, the installation script for package Distribute is retrieved from python-distribute and executed.[.]org – A traditional domain managed to drive advertising revenue, but now sold at a premium price point. ”

PyPI packages that contain bootstrap scripts to access the domain in question include tornado, pypiserver, slapos.core, roman, xlutils, and testfixtures.

DFIR retainer service

The core of the issue involves an old bootstrap script (‘bootstrap.py’) that was used with the zc.buildout tool to initialize the Buildout environment. The Python script also supported the ability to install a packaging utility called “Distribute”, a short-lived fork of the Setuptools project, into the local environment.

To accomplish this, the Distribute installation script (‘distribute_setup.py’) is fetched from python-distribute.[.]org is a domain for sale since 2014. The idea in adding this option was to tell the bootstrap script to download and install the Distribute package instead of the old Setuptools package to manage buildout eggs and dependencies.

It’s important to note that the Distribute fork was born in the absence of active development of Setuptools, the primary package management tool in use at the time. However, Distribute functionality was merged into Setuptools in 2013, and Distribute was deprecated.

The issue identified by ReversingLabs is related to the fact that many packages continue to ship bootstrap scripts that attempt to install Distribute by default or when command line options (‘-d’ or ‘–distribute’) are specified. This, combined with the fact that the domain in question is open to theft, exposes users to potential risk as an attacker could weaponize this setting to provide malicious code and steal sensitive data when the bootstrap script is executed incorrectly.

Although some of the affected packages have taken steps to remove their bootstrap scripts, the slapos.core package continues to ship vulnerable code. It is also included in development and maintenance versions of Tornado.

Another important aspect to consider here is that the bootstrap script is not automatically run during package installation and is written in Python 2. This means that the script cannot be run in Python 3 without modification. However, the mere presence of this file leaves an “unnecessary attack surface” that an attacker can exploit if a developer is tricked into executing code that triggers the execution of the bootstrap script.

The threat of domain takeover is not theoretical. In 2023, it was revealed that the npm package fsevents was compromised by a malicious attacker who gained control of unclaimed cloud resources hosted at fsevents-binaries.s3-us-west-2.amazonaws.[.]com to push a malicious executable to users who have installed specific versions of packages (CVE-2023-45311, CVSS Score: 9.8).

CIS build kit

“The problem lies in the programming pattern of retrieving and executing a payload from a hard-coded domain, which is a common pattern in malware that exhibits downloader behavior,” Pezo said. “By not formally deprecating the Distribute module, vulnerable bootstrap scripts remained and an unknown number of projects were left exposed to potential attacks.”

This disclosure comes after HelixGuard discovered a malicious package named “spellcheckers” on PyPI. Although the package claims to be a spelling error checking tool using OpenAI Vision, it contains malicious code designed to connect to an external server, download the next stage payload, and execute a remote access trojan (RAT).

This package was first uploaded to PyPI by user named leo636722 on November 15, 2025, and has been downloaded 955 times. Download is no longer possible.

“This RAT can receive remote commands and execute attacker-controlled Python code via exec(), allowing complete remote control of the victim host,” HelixGuard said. “Once a user installs and runs a malicious package, a backdoor is activated, allowing the attacker to remotely control the user’s computer.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNorth Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
Next Article Supabase CEO talks about ‘tough’ decisions that built his $5 billion company
user
  • Website

Related Posts

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

December 23, 2025

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

December 23, 2025

Google Workspace password manager tutorial

December 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

French postal and banking services disrupted by suspected DDoS attack

Inside Uzbekistan’s nationwide license plate monitoring system

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.