POC详情: c4f9f4c1231e6bb0e7fd2e32dda46b11b9fc5f9c

来源
关联漏洞
标题: Python tarfile 模块路径遍历漏洞 (CVE-2007-4559)
描述:Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。 Python tarfile模块中的(1)extract和(2)extractall函数存在路径遍历漏洞,该漏洞允许用户辅助远程攻击者通过..TAR存档文件中文件名中的(dot dot)序列,该漏洞与CVE-2001-1267相关。
描述
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
介绍
# Creosote

Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559. The tool recursively traverses the given directory searching for python files. When the tool finds python files it scans them for the tarfile module and then parses the code into an AST to look for vulnerable code. 

Creosote categorizes all found vulnerabilities under 3 main categories:

- Vuln: 
    - This is the highest confidence level the tool can give, anything marked as a vuln should be analyzed.
- Probable Vuln
    - Anything marked as probably vulnerable had the structure of a vuln but had some sort of indication of potentially being checked by the program. 
- Potential Vuln
    - This is a catch all to make sure nothing gets missed.

In order to run Creosote you just need to pass it the directory:

```
python3 creosote.py <directory to scan>
```

Creosote runs on both Linux, macOS, and Windows. The tool has been tested for Python 3.9 and later. 
文件快照

[4.0K] /data/pocs/c4f9f4c1231e6bb0e7fd2e32dda46b11b9fc5f9c ├── [9.3K] creosote.py ├── [ 554] LICENSE.txt └── [ 975] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。