Skip to content

Modded version of tarfile.py for testing arbitrary file (over)write via path traversal in Tar archives.

License

Notifications You must be signed in to change notification settings

giuliocomi/evilarchiver

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

evilarchiver

Modded version of tarfile.py for testing arbitrary file (over)write via path traversal in Tar archives.

This script is useful for quickly craft a tar archive with a file with dot-dot pattern as a filename and verify if the target library is vulnerable to arbitrary file overwrite via path traversal filenames.

This tool is almost the same of https://github.com/ptoomey3/evilarc. It depends upon zipfile and tarfile Python libraries.

Example:

$ mkdir safedir

$ touch safedir/safefile security_test.txt

$ python2 evilarchiver.py -e security_test.txt -n ../../../../../../tmp/evil -s safedir/safefile

Output:

creating archive zip
creating archive tar
creating archive tar.gz
creating archive tar.bz2

Contents of evil.zip:
['../../../../../../tmp/evil', 'safedir/safefile']

Contents of evil.tar:
['../../../../../../tmp/evil', 'safedir/safefile']

Contents of evil.tar.gz:
['../../../../../../tmp/evil', 'safedir/safefile']

Contents of evil.tar.bz2:
['../../../../../../tmp/evil', 'safedir/safefile']
Options: 

-n: filename crafted with dot-dot patterns
-e: malicious file which content we want to associate to the dot-dot filename
-s: safe or benign file and filename

About

Modded version of tarfile.py for testing arbitrary file (over)write via path traversal in Tar archives.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages