• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
15 year old unpatched python vulnerability potentially affects over 350,000 projects

15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects

You are here: Home / General Cyber Security News / 15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects
September 22, 2022

As several as 350,000 open up supply jobs are thought to be potentially susceptible to exploitation as a outcome of a security flaw in a Python module that has remained unpatched for 15 a long time.

The open up source repositories span a number of business verticals, these as software program growth, synthetic intelligence/machine studying, web progress, media, security, IT administration.

The shortcoming, tracked as CVE-2007-4559 (CVSS rating: 6.8), is rooted in the tarfile module, effective exploitation of which could guide to code execution from an arbitrary file produce.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

“The vulnerability is a route traversal attack in the extract and extractall functions in the tarfile module that make it possible for an attacker to overwrite arbitrary documents by introducing the ‘..’ sequence to filenames in a TAR archive,” Trellix security researcher Kasimir Schulz reported in a writeup.

Originally disclosed in August 2007, the bug has to do with how a specially crafted tar archive can be leveraged to overwrite arbitrary information on a target machine only on opening the file.

Place just, a risk actor can exploit the weakness by uploading a malicious tarfile in a manner that makes it achievable to escape the listing that a file is supposed to be extracted to and reach code execution, letting the adversary to potentially seize handle of a target unit.

“Hardly ever extract archives from untrusted resources without having prior inspection,” the Python documentation for tarfile reads. “It is achievable that information are produced outside the house of path, e.g. customers that have complete filenames commencing with “https://thehackernews.com/” or filenames with two dots ‘..’.”

CyberSecurity

The vulnerability is also reminiscent of a lately disclosed vulnerability in RARlab’s UnRAR utility (CVE-2022-30333) that could lead to distant code execution.

Trellix has more introduced a tailor made utility named Creosote to scan for projects vulnerable to CVE-2007-4559, applying it to uncover the vulnerability in the Spyder Python IDE as nicely as Polemarch.

“Remaining unchecked, this vulnerability has been unintentionally added to hundreds of countless numbers of open up- and shut-source initiatives globally, producing a considerable application provide chain attack surface area,” Douglas McKee noted.

Located this posting intriguing? Adhere to THN on Facebook, Twitter  and LinkedIn to study extra exceptional content material we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Authorized Push Payments Surge to 75% of Banking Fraud
Next Post: 15-year-old vulnerability found in Python module 15 year old vulnerability found in python module»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.