• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
15 year old vulnerability found in python module

15-year-old vulnerability found in Python module

You are here: Home / General Cyber Security News / 15-year-old vulnerability found in Python module
September 22, 2022

Getty Photographs

Researchers have identified a 15-calendar year-outdated vulnerability discovered in a Python module and identified that hundreds of thousands of repositories are exposed to it.

Trellix Innovative Analysis Center uncovered the vulnerability in Python’s tarfile module, the team unveiled yesterday. 1st, the centre imagined it had observed a new zero-day vulnerability but then realised it was CVE-2007-4559, a vulnerability first uncovered in 2007.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The vulnerability is a path traversal attack in the extract and extractall functions in the tarfile module that let an attacker to overwrite arbitrary data files by including the “…” sequence to filenames in a TAR archive.

Tarfiles are a collection of various diverse files and metadata which are then utilised to unarchive the tarfile. The metadata in a tar archive can have information on its identify, measurement, owner, and when it was archived. 

Attackers simply require to insert “…” with a separator for the running technique, either “/” or “”, into the file identify to escape the listing the file is meant to be extracted to. The tarfile module also lets users add a filter that can be utilized to parse and modify a file’s metadata right before it’s extra to the tar archive. This lets attackers generate their exploits with as little as six lines of code.

Through its research, Trellix discovered that hundreds of thousands of repositories have been exposed to the vulnerability.

“While the vulnerability was at first only marked as a 6.8, we had been capable to validate that in most circumstances an attacker can achieve code execution from the file publish,” wrote the centre.

Treliix added that the vulnerability is very uncomplicated to exploit, necessitating small to no expertise about sophisticated security topics. It added that it’s patching as numerous open-supply repositories as achievable as nicely as offering a way to scan closed-supply repositories.

Yet another Python vulnerability was discovered in May well this yr but in one particular of its popular open up-supply offers. Two open-source offers, Python’s CTX and PHP’s phpass, were being identified to be compromised which led to developers attempting to fully grasp their exposure to the vulnerability. All around 3 million consumers have been envisioned to be afflicted by the compromise, with one business enterprise by now reporting it experienced been influenced.


Some parts of this post are sourced from:
www.itpro.co.uk

Previous Post: «15 year old unpatched python vulnerability potentially affects over 350,000 projects 15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects
Next Post: Twitter Password Reset Bug Exposed User Accounts Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.