-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2007-4559 Patch #23530
CVE-2007-4559 Patch #23530
Conversation
Hi @TrellixVulnTeam, welcome and thank you for your contribution. We will try to review your Pull Request as quickly as possible. In the meantime, please take a look at the contribution guidelines if you have not done so already. |
we should probably address this - altho this PR is only catching a fraction of our |
checking further - its a bug from 2007 - which was not deemed a security issue by python, and consequently distributors (afaict) - seemingly as it is just POSIX compliance various solutions (similar to the one here) were discussed but in the end the only change was to docs regarding tars from untrusted sources in this case the source of the tars would either be the users own machine or RBE so im not sure we are dealing with untrusted sources here (that may not be the case with all untarring) that said - i can add look at adding some |
i will follow up on this as time allows, but will leave it open for now so its not forgotten /wait |
cc @Sim4n6 it would be good to address this for peace of mind and to prevent others from being concerned about it we host most of our python tooling in https://github.com/envoyproxy/pytooling so that is probably the best place to address this, and has other instances of "unsafe" extraction that should be looked at |
I'm not affiliated in any way with the reporting team. |
But I will make a look, thanks |
Hi @phlax, I don't see any reason for keeping this as a pending task, (on my side). Thank you. |
@phlax should this PR be closed for now? |
yeah lets close it - ive opened a ticket in toolshed to track/flag the issue envoyproxy/toolshed#1270 |
Patching CVE-2007-4559
Hi, we are security researchers from the Advanced Research Center at Trellix. We have began a campaign to patch a widespread bug named CVE-2007-4559. CVE-2007-4559 is a 15 year old bug in the Python tarfile package. By using extract() or extractall() on a tarfile object without sanitizing input, a maliciously crafted .tar file could perform a directory path traversal attack. We found at least one unsantized extractall() in your codebase and are providing a patch for you via pull request. The patch essentially checks to see if all tarfile members will be extracted safely and throws an exception otherwise. We encourage you to use this patch or your own solution to secure against CVE-2007-4559. Further technical information about the vulnerability can be found in this blog.
If you have further questions you may contact us through this projects lead researcher Kasimir Schulz.