Skip to content

[python] TarSlip vulnerability improvements #710

@Sim4n6

Description

@Sim4n6

Query PR

github/codeql#10851 (closed in favor of the next one)
github/codeql#10887

Language

Python

CVE(s) ID list

CWE

CWE-022

Report

  1. TarSlip vulnerability.
  2. _Extracting files from a malicious tarball without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten, due to the possible presence of directory traversal elements (..) in archive path names.
  3. I have added more sources and sinks than I checked the combination use of both.
  4. Yes, I've checked the query against valid samples extracted from https://cs.github.com. I ethically reported them using https://huntr.dev (more to become public soon).
  5. This is my first contribution, and I would love to provide more.

Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).

  • Yes
  • No

Blog post link

https://www.getrevue.co/profile/sim4n6

#710 (comment)

Metadata

Metadata

Assignees

No one assigned

    Labels

    All For OneSubmissions to the All for One, One for All bounty

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions