Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2007-4559 PoC — Python tarfile 模块路径遍历漏洞

Source
Associated Vulnerability
Title:Python tarfile 模块路径遍历漏洞 (CVE-2007-4559)
Description:Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。 Python tarfile模块中的(1)extract和(2)extractall函数存在路径遍历漏洞,该漏洞允许用户辅助远程攻击者通过..TAR存档文件中文件名中的(dot dot)序列,该漏洞与CVE-2001-1267相关。
Description
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
Readme
# Creosote

Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559. The tool recursively traverses the given directory searching for python files. When the tool finds python files it scans them for the tarfile module and then parses the code into an AST to look for vulnerable code. 

Creosote categorizes all found vulnerabilities under 3 main categories:

- Vuln: 
    - This is the highest confidence level the tool can give, anything marked as a vuln should be analyzed.
- Probable Vuln
    - Anything marked as probably vulnerable had the structure of a vuln but had some sort of indication of potentially being checked by the program. 
- Potential Vuln
    - This is a catch all to make sure nothing gets missed.

In order to run Creosote you just need to pass it the directory:

```
python3 creosote.py <directory to scan>
```

Creosote runs on both Linux, macOS, and Windows. The tool has been tested for Python 3.9 and later. 
File Snapshot

[4.0K] /data/pocs/c4f9f4c1231e6bb0e7fd2e32dda46b11b9fc5f9c ├── [9.3K] creosote.py ├── [ 554] LICENSE.txt └── [ 975] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.