{"id":"MAL-2026-3413","summary":"Malicious code in django-b64-img (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (f5ebdaebc61cf7a888322348e074f219519b7d09a24ab91732d8bc5061d86b2e)\nThe package provides a special image-storing field for Django REST Framework based on a legitimate implementation from the Hipo/drf-extra-fields repository. The malicious modification appends the cloud credentials and full `settings` values to the serialized form of specific image types. This way, an attacker can retrieve sensitive values by downloading back once uploaded image.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-05-old-django-b64-img\n\n\nReasons (based on the campaign):\n\n\n - exfiltration-credentials\n\n\n - obfuscation\n\n\n - backdoor\n","modified":"2026-05-10T21:32:20.919459Z","published":"2026-05-10T20:29:46Z","database_specific":{"malicious-packages-origins":[{"id":"pypi/2026-05-old-django-b64-img/django-b64-img","source":"kam193","modified_time":"2026-05-10T20:29:46.824334Z","import_time":"2026-05-10T21:20:42.442704837Z","versions":["1.1"],"sha256":"f5ebdaebc61cf7a888322348e074f219519b7d09a24ab91732d8bc5061d86b2e"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/django-b64-img"}],"affected":[{"package":{"name":"django-b64-img","ecosystem":"PyPI","purl":"pkg:pypi/django-b64-img"},"versions":["1.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/django-b64-img/MAL-2026-3413.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}