# PoC or Exploit for CVE-2007-4559
A malicious TAR archive can include file paths like ../../../../etc/passwd, which try to "climb up" out of the intended extraction folder.
If a Python script uses tarfile.extract() or extractall() without checking the file paths, it will unpack files to those locations — even if they point outside the target directory.
That means a hacker could overwrite sensitive or system files, especially if the user runs the script with elevated permissions.
# Vulnerable
As of 2025, both Debian 11–12 and Ubuntu 24 are still affected by this vulnerability. Other operating systems haven’t been tested, but these two are among the most widely used, so that alone is concerning. Even though this vulnerability dates back to 2007, it’s still present in LTS (long-term support) versions — and the vulnerable software isn’t patched automatically through a standard apt upgrade.
# Proof

[4.0K] /data/pocs/3beb6ca03441136a885f372923f6ce7182b47cb0
├── [1.9K] CVE-2007-4559-PoC.py
└── [1.0K] README.md
0 directories, 2 files