First published: Tue Dec 06 2022(Updated: )
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Py7zr Project Py7zr | <0.20.1 | |
debian/py7zr | 0.11.3+dfsg-1+deb11u1 0.11.3+dfsg-5 0.22.0+dfsg-1 | |
pip/py7zr | <=0.20.0 | 0.20.1 |
<0.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44900 is a directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier.
CVE-2022-44900 allows attackers to write arbitrary files by extracting a crafted 7z file.
CVE-2022-44900 has a severity rating of 9.1 (critical).
To fix CVE-2022-44900, update py7zr to version 0.20.1 or newer.
You can find more information about CVE-2022-44900 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-44900), [GitHub](https://github.com/miurahr/py7zr/commit/1bb43f17515c7f69673a1c88ab9cc72a7bbef406), [Packet Storm Security](http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html)