We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12718

Bypass extraction filter to modify file metadata outside extraction directory



Description

Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

Reserved 2024-12-17 | Published 2025-06-03 | Updated 2025-06-03 | Assigner PSF


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 3.9.23
affected

3.10.0 before 3.10.18
affected

3.11.0 before 3.11.13
affected

3.12.0 before 3.12.11
affected

3.13.0 before 3.13.4
affected

3.14.0a1 before 3.14.0
affected

Credits

Jakub Wilk reporter

Seth Larson coordinator

Petr Viktorin remediation developer

Serhiy Storchaka remediation developer

Hugo van Kemenade remediation reviewer

Łukasz Langa remediation reviewer

Thomas Wouters remediation reviewer

References

github.com/python/cpython/issues/135034 issue-tracking

github.com/python/cpython/pull/135037 patch

github.com/python/cpython/issues/127987 issue-tracking

mail.python.org/.../thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ vendor-advisory

github.com/...ommit/3612d8f51741b11f36f8fb0494d79086bac9390a patch

github.com/...ommit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a patch

gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f mitigation

github.com/...ommit/19de092debb3d7e832e5672cc2f7b788d35951da patch

github.com/...ommit/28463dba112af719df1e8b0391c46787ad756dd9 patch

github.com/...ommit/4633f3f497b1ff70e4a35b6fe2c907cbe2d4cb2e patch

github.com/...ommit/9c1110ef6652687d7c55f590f909720eddde965a patch

github.com/...ommit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01 patch

github.com/...ommit/dd8f187d0746da151e0025c51680979ac5b4cfb1 patch

cve.org (CVE-2024-12718)

nvd.nist.gov (CVE-2024-12718)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-12718

Support options

Helpdesk Chat, Email, Knowledgebase