CVE-2025-4517

Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Configurations

No configuration.

History

05 Jun 2025, 14:15

Type Values Removed Values Added
Summary (en) Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links. (en) Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

04 Jun 2025, 14:54

Type Values Removed Values Added
Summary
  • (es) Permite escrituras arbitrarias en el sistema de archivos fuera del directorio de extracción durante la extracción con filter="data". Esta vulnerabilidad afecta al usuario si utiliza el módulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el parámetro filter= con el valor "data" o "tar". Consulte la documentación sobre filtros de extracción de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener más información. Solo las versiones de Python 3.12 o posteriores se ven afectadas por estas vulnerabilidades; las versiones anteriores no incluyen la función de filtro de extracción. Tenga en cuenta que, para Python 3.14 o posteriores, el valor predeterminado de filter= cambió de "sin filtrado" a "data", por lo que si utiliza este nuevo comportamiento predeterminado, su uso también se verá afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalación de distribuciones fuente que son archivos tar, ya que estas permiten la ejecución de código arbitrario durante el proceso de compilación. Sin embargo, al evaluar distribuciones de origen es importante evitar instalar distribuciones de origen con enlaces sospechosos.

03 Jun 2025, 21:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/9c1110ef6652687d7c55f590f909720eddde965a -
  • () https://github.com/python/cpython/commit/dd8f187d0746da151e0025c51680979ac5b4cfb1 -

03 Jun 2025, 16:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/28463dba112af719df1e8b0391c46787ad756dd9 -
  • () https://github.com/python/cpython/commit/4633f3f497b1ff70e4a35b6fe2c907cbe2d4cb2e -

03 Jun 2025, 15:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da -
  • () https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01 -

03 Jun 2025, 14:15

Type Values Removed Values Added
References
  • () https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f -
  • () https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a -
  • () https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a -
  • () https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ -

03 Jun 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 13:15

Updated : 2025-06-05 14:15


NVD link : CVE-2025-4517

Mitre link : CVE-2025-4517

CVE.ORG link : CVE-2025-4517


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')