7.5 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.024 Low
EPSS
Percentile
89.8%
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a β¦ (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
CPE | Name | Operator | Version |
---|---|---|---|
python:python | python | lt | 3.10.12 |
python:python | python | lt | 3.9.17 |
python:python | python | lt | 3.8.17 |
python:python | python | lt | 3.6.16 |
python:python | python | lt | 3.11.4 |
mail.python.org/pipermail/python-dev/2007-August/074290.html
mail.python.org/pipermail/python-dev/2007-August/074292.html
secunia.com/advisories/26623
www.vupen.com/english/advisories/2007/3022
bugzilla.redhat.com/show_bug.cgi?id=263261
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
security.gentoo.org/glsa/202309-06
More