gsd-2007-4559
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Aliases
Aliases



{
   GSD: {
      alias: "CVE-2007-4559",
      id: "GSD-2007-4559",
      references: [
         "https://www.suse.com/security/cve/CVE-2007-4559.html",
      ],
   },
   gsd: {
      affected: [
         {
            package: {
               ecosystem: "Python",
               name: "python",
            },
            ranges: [
               {
                  events: [
                     {
                        introduced: "0",
                     },
                  ],
                  type: "SEMVER",
               },
            ],
            version: [
               "2.0.1",
               "2.1.3",
               "2.2",
               "2.2.1",
               "2.2.2",
               "2.2.3",
               "2.3",
               "2.3.1",
               "2.3.2",
               "2.3.22",
               "2.3.3",
               "2.3.32",
               "2.3.4",
               "2.3.42",
               "2.3.5",
               "2.3.52",
               "2.3.6",
               "2.3.62",
               "2.3.7",
               "2.3.72",
               "2.4",
               "2.4.1",
               "2.4.12",
               "2.4.2",
               "2.4.22",
               "2.4.3",
               "2.4.32",
               "2.4.4",
               "2.4.42",
               "2.4.5",
               "2.4.52",
               "2.4.6",
               "2.4.62",
               "2.42",
               "2.5",
               "2.5.1",
               "2.5.12",
               "2.5.2",
               "2.5.22",
               "2.5.3",
               "2.5.32",
               "2.5.4",
               "2.5.42",
               "2.5.5",
               "2.5.52",
               "2.5.6",
               "2.5.62",
               "2.52",
               "2.6",
               "2.6.1",
               "2.6.12",
               "2.6.2",
               "2.6.22",
               "2.6.3",
               "2.6.32",
               "2.6.4",
               "2.6.42",
               "2.6.5",
               "2.6.52",
               "2.6.6",
               "2.6.62",
               "2.6.7",
               "2.6.72",
               "2.6.8",
               "2.6.82",
               "2.6.9",
               "2.6.9",
               "2.62",
               "2.7",
               "2.7.1",
               "2.7.10",
               "2.7.10",
               "2.7.10rc1",
               "2.7.10rc1",
               "2.7.11",
               "2.7.11",
               "2.7.11rc1",
               "2.7.11rc1",
               "2.7.12",
               "2.7.12",
               "2.7.12",
               "2.7.12rc1",
               "2.7.12rc1",
               "2.7.13",
               "2.7.13",
               "2.7.13rc1",
               "2.7.13rc1",
               "2.7.14",
               "2.7.14",
               "2.7.14rc1",
               "2.7.14rc1",
               "2.7.15",
               "2.7.15",
               "2.7.15rc1",
               "2.7.15rc1",
               "2.7.16",
               "2.7.16",
               "2.7.16rc1",
               "2.7.16rc1",
               "2.7.17",
               "2.7.17",
               "2.7.17rc1",
               "2.7.17rc1",
               "2.7.18",
               "2.7.18",
               "2.7.18rc1",
               "2.7.18rc1",
               "2.7.2",
               "2.7.2",
               "2.7.22",
               "2.7.3",
               "2.7.3",
               "2.7.32",
               "2.7.4",
               "2.7.4",
               "2.7.42",
               "2.7.5",
               "2.7.5",
               "2.7.52",
               "2.7.6",
               "2.7.6",
               "2.7.7",
               "2.7.7",
               "2.7.7rc1",
               "2.7.7rc1",
               "2.7.8",
               "2.7.8",
               "2.7.9",
               "2.7.9",
               "2.7.9rc1",
               "2.7.9rc1",
               "2.72",
               "3.0",
               "3.0.1",
               "3.0.12",
               "3.02",
               "3.1",
               "3.1.1",
               "3.1.12",
               "3.1.2",
               "3.1.22",
               "3.1.3",
               "3.1.32",
               "3.1.4",
               "3.1.4",
               "3.1.42",
               "3.1.5",
               "3.1.5",
               "3.1.52",
               "3.2",
               "3.2",
               "3.2.1",
               "3.2.1",
               "3.2.12",
               "3.2.2",
               "3.2.2",
               "3.2.22",
               "3.2.3",
               "3.2.3",
               "3.2.32",
               "3.2.4",
               "3.2.4",
               "3.2.42",
               "3.2.5",
               "3.2.5",
               "3.2.52",
               "3.2.6",
               "3.2.6",
               "3.2.6rc1",
               "3.2.6rc1",
               "3.22",
               "3.3.0",
               "3.3.0",
               "3.3.02",
               "3.3.1",
               "3.3.1",
               "3.3.12",
               "3.3.2",
               "3.3.2",
               "3.3.22",
               "3.3.3",
               "3.3.3",
               "3.3.32",
               "3.3.4",
               "3.3.4",
               "3.3.5",
               "3.3.5",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc2",
               "3.3.5rc2",
               "3.3.6",
               "3.3.6",
               "3.3.6rc1",
               "3.3.6rc1",
               "3.3.7",
               "3.3.7",
               "3.3.7rc1",
               "3.3.7rc1",
               "3.4.0",
               "3.4.0",
               "3.4.0rc3",
               "3.4.0rc3",
               "3.4.1",
               "3.4.1",
               "3.4.10",
               "3.4.10",
               "3.4.10rc1",
               "3.4.10rc1",
               "3.4.1rc1",
               "3.4.1rc1",
               "3.4.2",
               "3.4.2",
               "3.4.2rc1",
               "3.4.2rc1",
               "3.4.3",
               "3.4.3",
               "3.4.3rc1",
               "3.4.3rc1",
               "3.4.4",
               "3.4.4",
               "3.4.4rc1",
               "3.4.4rc1",
               "3.4.5",
               "3.4.5",
               "3.4.5rc1",
               "3.4.5rc1",
               "3.4.6",
               "3.4.6",
               "3.4.6rc1",
               "3.4.6rc1",
               "3.4.7",
               "3.4.7",
               "3.4.7rc1",
               "3.4.7rc1",
               "3.4.8",
               "3.4.8",
               "3.4.8rc1",
               "3.4.8rc1",
               "3.4.9",
               "3.4.9",
               "3.4.9rc1",
               "3.4.9rc1",
               "3.5.0",
               "3.5.0",
               "3.5.0a1",
               "3.5.0a1",
               "3.5.0a2",
               "3.5.0a2",
               "3.5.0a3",
               "3.5.0a3",
               "3.5.0a4",
               "3.5.0a4",
               "3.5.0b1",
               "3.5.0b1",
               "3.5.0b2",
               "3.5.0b2",
               "3.5.0b3",
               "3.5.0b3",
               "3.5.0b4",
               "3.5.0b4",
               "3.5.0rc1",
               "3.5.0rc1",
               "3.5.0rc2",
               "3.5.0rc2",
               "3.5.0rc3",
               "3.5.0rc3",
               "3.5.0rc4",
               "3.5.0rc4",
               "3.5.1",
               "3.5.1",
               "3.5.10",
               "3.5.10",
               "3.5.10rc1",
               "3.5.10rc1",
               "3.5.1rc1",
               "3.5.1rc1",
               "3.5.2",
               "3.5.2",
               "3.5.2rc1",
               "3.5.2rc1",
               "3.5.3",
               "3.5.3",
               "3.5.3rc1",
               "3.5.3rc1",
               "3.5.4",
               "3.5.4",
               "3.5.4rc1",
               "3.5.4rc1",
               "3.5.5",
               "3.5.5",
               "3.5.5rc1",
               "3.5.5rc1",
               "3.5.6",
               "3.5.6",
               "3.5.6rc1",
               "3.5.6rc1",
               "3.5.7",
               "3.5.7",
               "3.5.7rc1",
               "3.5.7rc1",
               "3.5.8",
               "3.5.8",
               "3.5.8rc1",
               "3.5.8rc1",
               "3.5.8rc2",
               "3.5.8rc2",
               "3.5.9",
               "3.5.9",
               "3.6.0",
               "3.6.0",
               "3.6.0a1",
               "3.6.0a1",
               "3.6.0a2",
               "3.6.0a2",
               "3.6.0a3",
               "3.6.0a3",
               "3.6.0a4",
               "3.6.0a4",
               "3.6.0b1",
               "3.6.0b1",
               "3.6.0b2",
               "3.6.0b2",
               "3.6.0b3",
               "3.6.0b3",
               "3.6.0b4",
               "3.6.0b4",
               "3.6.0rc1",
               "3.6.0rc1",
               "3.6.0rc2",
               "3.6.0rc2",
               "3.6.1",
               "3.6.1",
               "3.6.10",
               "3.6.10",
               "3.6.10rc1",
               "3.6.10rc1",
               "3.6.11",
               "3.6.11",
               "3.6.11rc1",
               "3.6.11rc1",
               "3.6.12",
               "3.6.12",
               "3.6.13",
               "3.6.13",
               "3.6.14",
               "3.6.14",
               "3.6.15",
               "3.6.15",
               "3.6.1rc1",
               "3.6.1rc1",
               "3.6.2",
               "3.6.2",
               "3.6.2rc1",
               "3.6.2rc1",
               "3.6.2rc2",
               "3.6.2rc2",
               "3.6.3",
               "3.6.3",
               "3.6.3rc1",
               "3.6.3rc1",
               "3.6.4",
               "3.6.4",
               "3.6.4rc1",
               "3.6.4rc1",
               "3.6.5",
               "3.6.5",
               "3.6.5rc1",
               "3.6.5rc1",
               "3.6.6",
               "3.6.6",
               "3.6.6rc1",
               "3.6.6rc1",
               "3.6.7",
               "3.6.7",
               "3.6.7rc1",
               "3.6.7rc1",
               "3.6.7rc2",
               "3.6.7rc2",
               "3.6.8",
               "3.6.8",
               "3.6.8rc1",
               "3.6.8rc1",
               "3.6.9",
               "3.6.9",
               "3.6.9rc1",
               "3.6.9rc1",
               "3.7.0",
               "3.7.0",
               "3.7.0a1",
               "3.7.0a1",
               "3.7.0a2",
               "3.7.0a2",
               "3.7.0a3",
               "3.7.0a3",
               "3.7.0a4",
               "3.7.0a4",
               "3.7.0b1",
               "3.7.0b1",
               "3.7.0b2",
               "3.7.0b2",
               "3.7.0b5",
               "3.7.0b5",
               "3.7.0rc1",
               "3.7.0rc1",
               "3.7.1",
               "3.7.1",
               "3.7.10",
               "3.7.10",
               "3.7.11",
               "3.7.11",
               "3.7.12",
               "3.7.12",
               "3.7.13",
               "3.7.13",
               "3.7.14",
               "3.7.14",
               "3.7.1rc1",
               "3.7.1rc1",
               "3.7.1rc2",
               "3.7.1rc2",
               "3.7.2",
               "3.7.2",
               "3.7.2rc1",
               "3.7.2rc1",
               "3.7.3",
               "3.7.3",
               "3.7.3rc1",
               "3.7.3rc1",
               "3.7.4",
               "3.7.4",
               "3.7.4rc1",
               "3.7.4rc1",
               "3.7.5",
               "3.7.5",
               "3.7.5rc1",
               "3.7.5rc1",
               "3.7.6",
               "3.7.6",
               "3.7.6rc1",
               "3.7.6rc1",
               "3.7.7",
               "3.7.7",
               "3.7.7rc1",
               "3.7.7rc1",
               "3.7.8",
               "3.7.8",
               "3.7.8rc1",
               "3.7.8rc1",
               "3.7.9",
               "3.7.9",
               "3.8.0",
               "3.8.0",
               "3.8.0a1",
               "3.8.0a1",
               "3.8.0a2",
               "3.8.0a2",
               "3.8.0a3",
               "3.8.0a3",
               "3.8.0a4",
               "3.8.0a4",
               "3.8.0b1",
               "3.8.0b1",
               "3.8.0b2",
               "3.8.0b2",
               "3.8.0b3",
               "3.8.0b3",
               "3.8.0b4",
               "3.8.0b4",
               "3.8.0rc1",
               "3.8.0rc1",
               "3.8.1",
               "3.8.1",
               "3.8.10",
               "3.8.10",
               "3.8.11",
               "3.8.11",
               "3.8.12",
               "3.8.12",
               "3.8.13",
               "3.8.13",
               "3.8.14",
               "3.8.14",
               "3.8.1rc1",
               "3.8.1rc1",
               "3.8.2",
               "3.8.2",
               "3.8.2rc1",
               "3.8.2rc1",
               "3.8.2rc2",
               "3.8.2rc2",
               "3.8.3",
               "3.8.3",
               "3.8.3rc1",
               "3.8.3rc1",
               "3.8.4",
               "3.8.4",
               "3.8.4rc1",
               "3.8.4rc1",
               "3.8.5",
               "3.8.5",
               "3.8.6",
               "3.8.6",
               "3.8.6rc1",
               "3.8.6rc1",
               "3.8.7",
               "3.8.7",
               "3.8.7rc1",
               "3.8.7rc1",
               "3.8.8",
               "3.8.8",
               "3.8.8rc1",
               "3.8.8rc1",
               "3.8.9",
               "3.8.9",
               "3.9.0",
               "3.9.0",
               "3.9.0a1",
               "3.9.0a1",
               "3.9.0a2",
               "3.9.0a2",
               "3.9.0a3",
               "3.9.0a3",
               "3.9.0a4",
               "3.9.0a4",
               "3.9.0a5",
               "3.9.0a5",
               "3.9.0a6",
               "3.9.0a6",
               "3.9.0b1",
               "3.9.0b1",
               "3.9.0b2",
               "3.9.0b2",
               "3.9.0b3",
               "3.9.0b3",
               "3.9.0b4",
               "3.9.0b4",
               "3.9.0b5",
               "3.9.0b5",
               "3.9.0rc1",
               "3.9.0rc1",
               "3.9.0rc2",
               "3.9.0rc2",
               "3.9.1",
               "3.9.1",
               "3.9.10",
               "3.9.10",
               "3.9.11",
               "3.9.11",
               "3.9.12",
               "3.9.12",
               "3.9.13",
               "3.9.13",
               "3.9.14",
               "3.9.14",
               "3.9.1rc1",
               "3.9.1rc1",
               "3.9.2",
               "3.9.2",
               "3.9.2rc1",
               "3.9.2rc1",
               "3.9.4",
               "3.9.4",
               "3.9.5",
               "3.9.5",
               "3.9.6",
               "3.9.6",
               "3.9.7",
               "3.9.7",
               "3.9.8",
               "3.9.8",
               "3.9.9",
               "3.9.9",
               "3.10.0",
               "3.10.0",
               "3.10.0a1",
               "3.10.0a1",
               "3.10.0a2",
               "3.10.0a2",
               "3.10.0a3",
               "3.10.0a3",
               "3.10.0a4",
               "3.10.0a4",
               "3.10.0a5",
               "3.10.0a5",
               "3.10.0a6",
               "3.10.0a6",
               "3.10.0a7",
               "3.10.0a7",
               "3.10.0b1",
               "3.10.0b1",
               "3.10.0b2",
               "3.10.0b2",
               "3.10.0b3",
               "3.10.0b3",
               "3.10.0b4",
               "3.10.0b4",
               "3.10.0rc1",
               "3.10.0rc1",
               "3.10.0rc2",
               "3.10.0rc2",
               "3.10.1",
               "3.10.1",
               "3.10.2",
               "3.10.2",
               "3.10.3",
               "3.10.3",
               "3.10.4",
               "3.10.4",
               "3.10.5",
               "3.10.5",
               "3.10.6",
               "3.10.6",
               "3.10.7",
               "3.10.7",
               "3.11.0a1",
               "3.11.0a1",
               "3.11.0a2",
               "3.11.0a2",
               "3.11.0a3",
               "3.11.0a3",
               "3.11.0a4",
               "3.11.0a4",
               "3.11.0a5",
               "3.11.0a5",
               "3.11.0a6",
               "3.11.0a6",
               "3.11.0a7",
               "3.11.0a7",
               "3.11.0b1",
               "3.11.0b1",
               "3.11.0b2",
               "3.11.0b2",
               "3.11.0b3",
               "3.11.0b3",
               "3.11.0b4",
               "3.11.0b4",
               "3.11.0b5",
               "3.11.0b5",
               "3.11.0rc1",
               "3.11.0rc1",
               "3.11.0rc2",
               "3.11.0rc2",
               "3.12",
            ],
         },
         {
            package: {
               ecosystem: "Python",
               name: "cpython",
            },
            ranges: [
               {
                  events: [
                     {
                        introduced: "0",
                     },
                  ],
                  type: "SEMVER",
               },
            ],
            version: [
               "2.0.1",
               "2.1.3",
               "2.2",
               "2.2.1",
               "2.2.2",
               "2.2.3",
               "2.3",
               "2.3.1",
               "2.3.2",
               "2.3.22",
               "2.3.3",
               "2.3.32",
               "2.3.4",
               "2.3.42",
               "2.3.5",
               "2.3.52",
               "2.3.6",
               "2.3.62",
               "2.3.7",
               "2.3.72",
               "2.4",
               "2.4.1",
               "2.4.12",
               "2.4.2",
               "2.4.22",
               "2.4.3",
               "2.4.32",
               "2.4.4",
               "2.4.42",
               "2.4.5",
               "2.4.52",
               "2.4.6",
               "2.4.62",
               "2.42",
               "2.5",
               "2.5.1",
               "2.5.12",
               "2.5.2",
               "2.5.22",
               "2.5.3",
               "2.5.32",
               "2.5.4",
               "2.5.42",
               "2.5.5",
               "2.5.52",
               "2.5.6",
               "2.5.62",
               "2.52",
               "2.6",
               "2.6.1",
               "2.6.12",
               "2.6.2",
               "2.6.22",
               "2.6.3",
               "2.6.32",
               "2.6.4",
               "2.6.42",
               "2.6.5",
               "2.6.52",
               "2.6.6",
               "2.6.62",
               "2.6.7",
               "2.6.72",
               "2.6.8",
               "2.6.82",
               "2.6.9",
               "2.6.9",
               "2.62",
               "2.7",
               "2.7.1",
               "2.7.10",
               "2.7.10",
               "2.7.10rc1",
               "2.7.10rc1",
               "2.7.11",
               "2.7.11",
               "2.7.11rc1",
               "2.7.11rc1",
               "2.7.12",
               "2.7.12",
               "2.7.12",
               "2.7.12rc1",
               "2.7.12rc1",
               "2.7.13",
               "2.7.13",
               "2.7.13rc1",
               "2.7.13rc1",
               "2.7.14",
               "2.7.14",
               "2.7.14rc1",
               "2.7.14rc1",
               "2.7.15",
               "2.7.15",
               "2.7.15rc1",
               "2.7.15rc1",
               "2.7.16",
               "2.7.16",
               "2.7.16rc1",
               "2.7.16rc1",
               "2.7.17",
               "2.7.17",
               "2.7.17rc1",
               "2.7.17rc1",
               "2.7.18",
               "2.7.18",
               "2.7.18rc1",
               "2.7.18rc1",
               "2.7.2",
               "2.7.2",
               "2.7.22",
               "2.7.3",
               "2.7.3",
               "2.7.32",
               "2.7.4",
               "2.7.4",
               "2.7.42",
               "2.7.5",
               "2.7.5",
               "2.7.52",
               "2.7.6",
               "2.7.6",
               "2.7.7",
               "2.7.7",
               "2.7.7rc1",
               "2.7.7rc1",
               "2.7.8",
               "2.7.8",
               "2.7.9",
               "2.7.9",
               "2.7.9rc1",
               "2.7.9rc1",
               "2.72",
               "3.0",
               "3.0.1",
               "3.0.12",
               "3.02",
               "3.1",
               "3.1.1",
               "3.1.12",
               "3.1.2",
               "3.1.22",
               "3.1.3",
               "3.1.32",
               "3.1.4",
               "3.1.4",
               "3.1.42",
               "3.1.5",
               "3.1.5",
               "3.1.52",
               "3.2",
               "3.2",
               "3.2.1",
               "3.2.1",
               "3.2.12",
               "3.2.2",
               "3.2.2",
               "3.2.22",
               "3.2.3",
               "3.2.3",
               "3.2.32",
               "3.2.4",
               "3.2.4",
               "3.2.42",
               "3.2.5",
               "3.2.5",
               "3.2.52",
               "3.2.6",
               "3.2.6",
               "3.2.6rc1",
               "3.2.6rc1",
               "3.22",
               "3.3.0",
               "3.3.0",
               "3.3.02",
               "3.3.1",
               "3.3.1",
               "3.3.12",
               "3.3.2",
               "3.3.2",
               "3.3.22",
               "3.3.3",
               "3.3.3",
               "3.3.32",
               "3.3.4",
               "3.3.4",
               "3.3.5",
               "3.3.5",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc1",
               "3.3.5rc2",
               "3.3.5rc2",
               "3.3.6",
               "3.3.6",
               "3.3.6rc1",
               "3.3.6rc1",
               "3.3.7",
               "3.3.7",
               "3.3.7rc1",
               "3.3.7rc1",
               "3.4.0",
               "3.4.0",
               "3.4.0rc3",
               "3.4.0rc3",
               "3.4.1",
               "3.4.1",
               "3.4.10",
               "3.4.10",
               "3.4.10rc1",
               "3.4.10rc1",
               "3.4.1rc1",
               "3.4.1rc1",
               "3.4.2",
               "3.4.2",
               "3.4.2rc1",
               "3.4.2rc1",
               "3.4.3",
               "3.4.3",
               "3.4.3rc1",
               "3.4.3rc1",
               "3.4.4",
               "3.4.4",
               "3.4.4rc1",
               "3.4.4rc1",
               "3.4.5",
               "3.4.5",
               "3.4.5rc1",
               "3.4.5rc1",
               "3.4.6",
               "3.4.6",
               "3.4.6rc1",
               "3.4.6rc1",
               "3.4.7",
               "3.4.7",
               "3.4.7rc1",
               "3.4.7rc1",
               "3.4.8",
               "3.4.8",
               "3.4.8rc1",
               "3.4.8rc1",
               "3.4.9",
               "3.4.9",
               "3.4.9rc1",
               "3.4.9rc1",
               "3.5.0",
               "3.5.0",
               "3.5.0a1",
               "3.5.0a1",
               "3.5.0a2",
               "3.5.0a2",
               "3.5.0a3",
               "3.5.0a3",
               "3.5.0a4",
               "3.5.0a4",
               "3.5.0b1",
               "3.5.0b1",
               "3.5.0b2",
               "3.5.0b2",
               "3.5.0b3",
               "3.5.0b3",
               "3.5.0b4",
               "3.5.0b4",
               "3.5.0rc1",
               "3.5.0rc1",
               "3.5.0rc2",
               "3.5.0rc2",
               "3.5.0rc3",
               "3.5.0rc3",
               "3.5.0rc4",
               "3.5.0rc4",
               "3.5.1",
               "3.5.1",
               "3.5.10",
               "3.5.10",
               "3.5.10rc1",
               "3.5.10rc1",
               "3.5.1rc1",
               "3.5.1rc1",
               "3.5.2",
               "3.5.2",
               "3.5.2rc1",
               "3.5.2rc1",
               "3.5.3",
               "3.5.3",
               "3.5.3rc1",
               "3.5.3rc1",
               "3.5.4",
               "3.5.4",
               "3.5.4rc1",
               "3.5.4rc1",
               "3.5.5",
               "3.5.5",
               "3.5.5rc1",
               "3.5.5rc1",
               "3.5.6",
               "3.5.6",
               "3.5.6rc1",
               "3.5.6rc1",
               "3.5.7",
               "3.5.7",
               "3.5.7rc1",
               "3.5.7rc1",
               "3.5.8",
               "3.5.8",
               "3.5.8rc1",
               "3.5.8rc1",
               "3.5.8rc2",
               "3.5.8rc2",
               "3.5.9",
               "3.5.9",
               "3.6.0",
               "3.6.0",
               "3.6.0a1",
               "3.6.0a1",
               "3.6.0a2",
               "3.6.0a2",
               "3.6.0a3",
               "3.6.0a3",
               "3.6.0a4",
               "3.6.0a4",
               "3.6.0b1",
               "3.6.0b1",
               "3.6.0b2",
               "3.6.0b2",
               "3.6.0b3",
               "3.6.0b3",
               "3.6.0b4",
               "3.6.0b4",
               "3.6.0rc1",
               "3.6.0rc1",
               "3.6.0rc2",
               "3.6.0rc2",
               "3.6.1",
               "3.6.1",
               "3.6.10",
               "3.6.10",
               "3.6.10rc1",
               "3.6.10rc1",
               "3.6.11",
               "3.6.11",
               "3.6.11rc1",
               "3.6.11rc1",
               "3.6.12",
               "3.6.12",
               "3.6.13",
               "3.6.13",
               "3.6.14",
               "3.6.14",
               "3.6.15",
               "3.6.15",
               "3.6.1rc1",
               "3.6.1rc1",
               "3.6.2",
               "3.6.2",
               "3.6.2rc1",
               "3.6.2rc1",
               "3.6.2rc2",
               "3.6.2rc2",
               "3.6.3",
               "3.6.3",
               "3.6.3rc1",
               "3.6.3rc1",
               "3.6.4",
               "3.6.4",
               "3.6.4rc1",
               "3.6.4rc1",
               "3.6.5",
               "3.6.5",
               "3.6.5rc1",
               "3.6.5rc1",
               "3.6.6",
               "3.6.6",
               "3.6.6rc1",
               "3.6.6rc1",
               "3.6.7",
               "3.6.7",
               "3.6.7rc1",
               "3.6.7rc1",
               "3.6.7rc2",
               "3.6.7rc2",
               "3.6.8",
               "3.6.8",
               "3.6.8rc1",
               "3.6.8rc1",
               "3.6.9",
               "3.6.9",
               "3.6.9rc1",
               "3.6.9rc1",
               "3.7.0",
               "3.7.0",
               "3.7.0a1",
               "3.7.0a1",
               "3.7.0a2",
               "3.7.0a2",
               "3.7.0a3",
               "3.7.0a3",
               "3.7.0a4",
               "3.7.0a4",
               "3.7.0b1",
               "3.7.0b1",
               "3.7.0b2",
               "3.7.0b2",
               "3.7.0b5",
               "3.7.0b5",
               "3.7.0rc1",
               "3.7.0rc1",
               "3.7.1",
               "3.7.1",
               "3.7.10",
               "3.7.10",
               "3.7.11",
               "3.7.11",
               "3.7.12",
               "3.7.12",
               "3.7.13",
               "3.7.13",
               "3.7.14",
               "3.7.14",
               "3.7.1rc1",
               "3.7.1rc1",
               "3.7.1rc2",
               "3.7.1rc2",
               "3.7.2",
               "3.7.2",
               "3.7.2rc1",
               "3.7.2rc1",
               "3.7.3",
               "3.7.3",
               "3.7.3rc1",
               "3.7.3rc1",
               "3.7.4",
               "3.7.4",
               "3.7.4rc1",
               "3.7.4rc1",
               "3.7.5",
               "3.7.5",
               "3.7.5rc1",
               "3.7.5rc1",
               "3.7.6",
               "3.7.6",
               "3.7.6rc1",
               "3.7.6rc1",
               "3.7.7",
               "3.7.7",
               "3.7.7rc1",
               "3.7.7rc1",
               "3.7.8",
               "3.7.8",
               "3.7.8rc1",
               "3.7.8rc1",
               "3.7.9",
               "3.7.9",
               "3.8.0",
               "3.8.0",
               "3.8.0a1",
               "3.8.0a1",
               "3.8.0a2",
               "3.8.0a2",
               "3.8.0a3",
               "3.8.0a3",
               "3.8.0a4",
               "3.8.0a4",
               "3.8.0b1",
               "3.8.0b1",
               "3.8.0b2",
               "3.8.0b2",
               "3.8.0b3",
               "3.8.0b3",
               "3.8.0b4",
               "3.8.0b4",
               "3.8.0rc1",
               "3.8.0rc1",
               "3.8.1",
               "3.8.1",
               "3.8.10",
               "3.8.10",
               "3.8.11",
               "3.8.11",
               "3.8.12",
               "3.8.12",
               "3.8.13",
               "3.8.13",
               "3.8.14",
               "3.8.14",
               "3.8.1rc1",
               "3.8.1rc1",
               "3.8.2",
               "3.8.2",
               "3.8.2rc1",
               "3.8.2rc1",
               "3.8.2rc2",
               "3.8.2rc2",
               "3.8.3",
               "3.8.3",
               "3.8.3rc1",
               "3.8.3rc1",
               "3.8.4",
               "3.8.4",
               "3.8.4rc1",
               "3.8.4rc1",
               "3.8.5",
               "3.8.5",
               "3.8.6",
               "3.8.6",
               "3.8.6rc1",
               "3.8.6rc1",
               "3.8.7",
               "3.8.7",
               "3.8.7rc1",
               "3.8.7rc1",
               "3.8.8",
               "3.8.8",
               "3.8.8rc1",
               "3.8.8rc1",
               "3.8.9",
               "3.8.9",
               "3.9.0",
               "3.9.0",
               "3.9.0a1",
               "3.9.0a1",
               "3.9.0a2",
               "3.9.0a2",
               "3.9.0a3",
               "3.9.0a3",
               "3.9.0a4",
               "3.9.0a4",
               "3.9.0a5",
               "3.9.0a5",
               "3.9.0a6",
               "3.9.0a6",
               "3.9.0b1",
               "3.9.0b1",
               "3.9.0b2",
               "3.9.0b2",
               "3.9.0b3",
               "3.9.0b3",
               "3.9.0b4",
               "3.9.0b4",
               "3.9.0b5",
               "3.9.0b5",
               "3.9.0rc1",
               "3.9.0rc1",
               "3.9.0rc2",
               "3.9.0rc2",
               "3.9.1",
               "3.9.1",
               "3.9.10",
               "3.9.10",
               "3.9.11",
               "3.9.11",
               "3.9.12",
               "3.9.12",
               "3.9.13",
               "3.9.13",
               "3.9.14",
               "3.9.14",
               "3.9.1rc1",
               "3.9.1rc1",
               "3.9.2",
               "3.9.2",
               "3.9.2rc1",
               "3.9.2rc1",
               "3.9.4",
               "3.9.4",
               "3.9.5",
               "3.9.5",
               "3.9.6",
               "3.9.6",
               "3.9.7",
               "3.9.7",
               "3.9.8",
               "3.9.8",
               "3.9.9",
               "3.9.9",
               "3.10.0",
               "3.10.0",
               "3.10.0a1",
               "3.10.0a1",
               "3.10.0a2",
               "3.10.0a2",
               "3.10.0a3",
               "3.10.0a3",
               "3.10.0a4",
               "3.10.0a4",
               "3.10.0a5",
               "3.10.0a5",
               "3.10.0a6",
               "3.10.0a6",
               "3.10.0a7",
               "3.10.0a7",
               "3.10.0b1",
               "3.10.0b1",
               "3.10.0b2",
               "3.10.0b2",
               "3.10.0b3",
               "3.10.0b3",
               "3.10.0b4",
               "3.10.0b4",
               "3.10.0rc1",
               "3.10.0rc1",
               "3.10.0rc2",
               "3.10.0rc2",
               "3.10.1",
               "3.10.1",
               "3.10.2",
               "3.10.2",
               "3.10.3",
               "3.10.3",
               "3.10.4",
               "3.10.4",
               "3.10.5",
               "3.10.5",
               "3.10.6",
               "3.10.6",
               "3.10.7",
               "3.10.7",
               "3.11.0a1",
               "3.11.0a1",
               "3.11.0a2",
               "3.11.0a2",
               "3.11.0a3",
               "3.11.0a3",
               "3.11.0a4",
               "3.11.0a4",
               "3.11.0a5",
               "3.11.0a5",
               "3.11.0a6",
               "3.11.0a6",
               "3.11.0a7",
               "3.11.0a7",
               "3.11.0b1",
               "3.11.0b1",
               "3.11.0b2",
               "3.11.0b2",
               "3.11.0b3",
               "3.11.0b3",
               "3.11.0b4",
               "3.11.0b4",
               "3.11.0b5",
               "3.11.0b5",
               "3.11.0rc1",
               "3.11.0rc1",
               "3.11.0rc2",
               "3.11.0rc2",
               "3.12",
            ],
         },
      ],
      alias: [
         "CVE-2007-4559",
      ],
      database_specific: {
         GSD: {
            alias: "CVE-2007-4559",
            description: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
            id: "GSD-2007-4559",
         },
      },
      details: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
      id: "GSD-2007-4559",
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      modified: "2022-09-29T02:14:03.219506Z",
      osvSchema: {
         aliases: [
            "CVE-2007-4559",
         ],
         details: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
         id: "GSD-2007-4559",
         modified: "2023-12-13T01:21:36.286594Z",
         schema_version: "1.4.0",
      },
      references: [
         {
            type: "FIX",
            url: "https://bugs.python.org/file8339/insecure_pathnames.diff",
         },
         {
            type: "WEB",
            url: "https://github.com/python/cpython/commits/main/Lib/tarfile.py",
         },
         {
            type: "WEB",
            url: "https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html",
         },
         {
            type: "ADVISORY",
            url: "https://github.com/python/cpython/issues/73974",
         },
         {
            type: "ADVISORY",
            url: "https://github.com/python/cpython/issues/45385",
         },
         {
            type: "ADVISORY",
            url: "https://github.com/python/cpython/issues/94531",
         },
         {
            type: "ADVISORY",
            url: "https://github.com/python/cpython/issues/88189",
         },
         {
            type: "ADVISORY",
            url: "https://bugs.python.org/issue1044",
         },
         {
            type: "ADVISORY",
            url: "http://secunia.com/advisories/26623",
         },
         {
            type: "ADVISORY",
            url: "http://www.vupen.com/english/advisories/2007/3022",
         },
         {
            type: "ADVISORY",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
         },
         {
            type: "ADVISORY",
            url: "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
         },
         {
            type: "ADVISORY",
            url: "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
         },
      ],
      schema_version: "1.3.1",
      severity: [
         {
            score: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            type: "CVSS_V2",
         },
      ],
      summary: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "cve@mitre.org",
            ID: "CVE-2007-4559",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "n/a",
                              version: {
                                 version_data: [
                                    {
                                       version_value: "n/a",
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "n/a",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
               },
            ],
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "n/a",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "26623",
                  refsource: "SECUNIA",
                  url: "http://secunia.com/advisories/26623",
               },
               {
                  name: "ADV-2007-3022",
                  refsource: "VUPEN",
                  url: "http://www.vupen.com/english/advisories/2007/3022",
               },
               {
                  name: "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
                  refsource: "CONFIRM",
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
               },
               {
                  name: "[python-dev] 20070824 tarfile and directory traversal vulnerability",
                  refsource: "MLIST",
                  url: "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
               },
               {
                  name: "[python-dev] 20070825 tarfile and directory traversal vulnerability",
                  refsource: "MLIST",
                  url: "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
               },
               {
                  name: "GLSA-202309-06",
                  refsource: "GENTOO",
                  url: "https://security.gentoo.org/glsa/202309-06",
               },
               {
                  name: "FEDORA-2024-d1f1084584",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
               },
               {
                  name: "FEDORA-2024-ebb3c95344",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
               },
               {
                  name: "FEDORA-2024-46374d2703",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
               },
            ],
         },
      },
      "nvd.nist.gov": {
         cve: {
            configurations: [
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "230CAC0B-F126-4DE4-B789-3C77CBB31F8D",
                              versionEndExcluding: "3.6.16",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "B5AD617D-8CD2-4DC8-84B1-D3FDF9F85607",
                              versionEndExcluding: "3.8.17",
                              versionStartIncluding: "3.7.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "0287FC5A-256F-40EE-93D0-2DFFE38BB5A1",
                              versionEndExcluding: "3.9.17",
                              versionStartIncluding: "3.9.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "4AA7FA11-C746-4E69-94C2-18E745D82054",
                              versionEndExcluding: "3.10.12",
                              versionStartIncluding: "3.10.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "AD14A157-FEA9-411F-B338-F1B6F726599D",
                              versionEndExcluding: "3.11.4",
                              versionStartIncluding: "3.11.0",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
            ],
            descriptions: [
               {
                  lang: "en",
                  value: "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
               },
               {
                  lang: "es",
                  value: "Vulnerabilidad de salto de directorio en las funciones (1) extract y (2) extractall en el módulo tarfile en Python permite a atacantes remotos con la intervención del usuario sobrescribir archivos de su elección a través de la secuencia ..(punto punto) en nombres de archivos en archivos TAR, un asunto relacionado es CVE-2001-1267.",
               },
            ],
            id: "CVE-2007-4559",
            lastModified: "2024-03-23T03:15:08.413",
            metrics: {
               cvssMetricV2: [
                  {
                     acInsufInfo: false,
                     baseSeverity: "MEDIUM",
                     cvssData: {
                        accessComplexity: "MEDIUM",
                        accessVector: "NETWORK",
                        authentication: "NONE",
                        availabilityImpact: "PARTIAL",
                        baseScore: 6.8,
                        confidentialityImpact: "PARTIAL",
                        integrityImpact: "PARTIAL",
                        vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                        version: "2.0",
                     },
                     exploitabilityScore: 8.6,
                     impactScore: 6.4,
                     obtainAllPrivilege: false,
                     obtainOtherPrivilege: true,
                     obtainUserPrivilege: false,
                     source: "nvd@nist.gov",
                     type: "Primary",
                     userInteractionRequired: true,
                  },
               ],
            },
            published: "2007-08-28T01:17:00.000",
            references: [
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Mailing List",
                     "Vendor Advisory",
                  ],
                  url: "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Exploit",
                     "Mailing List",
                  ],
                  url: "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Broken Link",
                  ],
                  url: "http://secunia.com/advisories/26623",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Broken Link",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/3022",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Issue Tracking",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://security.gentoo.org/glsa/202309-06",
               },
            ],
            sourceIdentifier: "cve@mitre.org",
            vendorComments: [
               {
                  comment: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=263261\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\n",
                  lastModified: "2007-10-15T00:00:00",
                  organization: "Red Hat",
               },
            ],
            vulnStatus: "Modified",
            weaknesses: [
               {
                  description: [
                     {
                        lang: "en",
                        value: "CWE-22",
                     },
                  ],
                  source: "nvd@nist.gov",
                  type: "Primary",
               },
            ],
         },
      },
   },
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.