A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/miurahr/py7zr/commit/1bb43f17515c7f69673a1c88ab9cc72a7bbef406 | third party advisory patch |
http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html | exploit vdb entry third party advisory |
https://lessonsec.com/cve/cve-2022-44900/ | third party advisory exploit |