{"api_version":"1","generated_at":"2026-04-23T02:36:06+00:00","cve":"CVE-2007-4559","urls":{"html":"https://cve.report/CVE-2007-4559","api":"https://cve.report/api/cve/CVE-2007-4559.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-4559","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-4559"},"summary":{"title":"CVE-2007-4559","description":"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-08-28 01:17:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-22","n/a","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.8","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://mail.python.org/pipermail/python-dev/2007-August/074292.html","name":"http://mail.python.org/pipermail/python-dev/2007-August/074292.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List"],"title":"[Python-Dev] tarfile and directory traversal vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/3022","name":"http://www.vupen.com/english/advisories/2007/3022","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26623","name":"http://secunia.com/advisories/26623","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Python tarfile Module Directory Traversal and Symlink Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=263261","name":"https://bugzilla.redhat.com/show_bug.cgi?id=263261","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"],"title":"Bug 263261 – CVE-2007-4559 python tarfile module directory traversal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://mail.python.org/pipermail/python-dev/2007-August/074290.html","name":"http://mail.python.org/pipermail/python-dev/2007-August/074290.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"],"title":"[Python-Dev] tarfile and directory traversal vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security.gentoo.org/glsa/202309-06","name":"https://security.gentoo.org/glsa/202309-06","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Samba: Multiple Vulnerabilities (GLSA 202309-06) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-4559","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-4559","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"4559","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"python","cpe5":"python","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-4559","organization":"Red Hat","lastmodified":"2007-10-15","contributor":"Joshua Bressers","statementText":"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=263261 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/","cve_year":"2007","cve_id":"4559","crc32":"55ab3a81"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2007-4559","qid":"161059","title":"Oracle Enterprise Linux Security Update for python-pip (ELSA-2023-6694)"},{"cve":"CVE-2007-4559","qid":"161073","title":"Oracle Enterprise Linux Security Update for python3.11-pip (ELSA-2023-6324)"},{"cve":"CVE-2007-4559","qid":"161120","title":"Oracle Enterprise Linux Security Update for python3.9 (ELSA-2023-6659)"},{"cve":"CVE-2007-4559","qid":"161128","title":"Oracle Enterprise Linux Security Update for python3.11 (ELSA-2023-6494)"},{"cve":"CVE-2007-4559","qid":"161134","title":"Oracle Enterprise Linux Security Update for python3.11-pip (ELSA-2023-6914)"},{"cve":"CVE-2007-4559","qid":"161140","title":"Oracle Enterprise Linux Security Update for python3 (ELSA-2023-7151)"},{"cve":"CVE-2007-4559","qid":"161146","title":"Oracle Enterprise Linux Security Update for python39:3.9 and python39-devel:3.9 (ELSA-2023-7034)"},{"cve":"CVE-2007-4559","qid":"161148","title":"Oracle Enterprise Linux Security Update for python3.11 (ELSA-2023-7024)"},{"cve":"CVE-2007-4559","qid":"161165","title":"Oracle Enterprise Linux Security Update for python38:3.8 and python38-devel:3.8 (ELSA-2023-7050)"},{"cve":"CVE-2007-4559","qid":"161169","title":"Oracle Enterprise Linux Security Update for python-pip (ELSA-2023-7176)"},{"cve":"CVE-2007-4559","qid":"242280","title":"Red Hat Update for python-pip (RHSA-2023:6694)"},{"cve":"CVE-2007-4559","qid":"242304","title":"Red Hat Update for python3.11 (RHSA-2023:6494)"},{"cve":"CVE-2007-4559","qid":"242323","title":"Red Hat Update for python3.9 (RHSA-2023:6659)"},{"cve":"CVE-2007-4559","qid":"242328","title":"Red Hat Update for python3.11-pip (RHSA-2023:6324)"},{"cve":"CVE-2007-4559","qid":"242344","title":"Red Hat Update for rh-python38-python (RHSA-2023:6793)"},{"cve":"CVE-2007-4559","qid":"242412","title":"Red Hat Update for python3.11 (RHSA-2023:7024)"},{"cve":"CVE-2007-4559","qid":"242414","title":"Red Hat Update for python39:3.9 and python39-devel:3.9 (RHSA-2023:7034)"},{"cve":"CVE-2007-4559","qid":"242420","title":"Red Hat Update for python3.11-pip (RHSA-2023:6914)"},{"cve":"CVE-2007-4559","qid":"242431","title":"Red Hat Update for python38:3.8 and python38-devel:3.8 (RHSA-2023:7050)"},{"cve":"CVE-2007-4559","qid":"242435","title":"Red Hat Update for python-pip (RHSA-2023:7176)"},{"cve":"CVE-2007-4559","qid":"242444","title":"Red Hat Update for python3 (RHSA-2023:7151)"},{"cve":"CVE-2007-4559","qid":"242730","title":"Red Hat Update for python-pip (RHSA-2024:0374)"},{"cve":"CVE-2007-4559","qid":"242742","title":"Red Hat Update for python3 (RHSA-2024:0430)"},{"cve":"CVE-2007-4559","qid":"242829","title":"Red Hat Update for python-pip (RHSA-2024:0587)"},{"cve":"CVE-2007-4559","qid":"285358","title":"Fedora Security Update for python3.6 (FEDORA-2024-d1f1084584)"},{"cve":"CVE-2007-4559","qid":"285359","title":"Fedora Security Update for python3.6 (FEDORA-2024-ebb3c95344)"},{"cve":"CVE-2007-4559","qid":"379247","title":"Alibaba Cloud Linux Security Update for python-pip (ALINUX3-SA-2024:0005)"},{"cve":"CVE-2007-4559","qid":"379638","title":"Alibaba Cloud Linux Security Update for python3 (ALINUX3-SA-2024:0040)"},{"cve":"CVE-2007-4559","qid":"673632","title":"EulerOS Security Update for python3 (EulerOS-SA-2023-2705)"},{"cve":"CVE-2007-4559","qid":"674058","title":"EulerOS Security Update for python3 (EulerOS-SA-2023-2663)"},{"cve":"CVE-2007-4559","qid":"710751","title":"Gentoo Linux Samba Multiple Vulnerabilities (GLSA 202309-06)"},{"cve":"CVE-2007-4559","qid":"754078","title":"SUSE Enterprise Linux Security Update for python36 (SUSE-SU-2023:2473-1)"},{"cve":"CVE-2007-4559","qid":"754099","title":"SUSE Enterprise Linux Security Update for python3 (SUSE-SU-2023:2517-1)"},{"cve":"CVE-2007-4559","qid":"754211","title":"SUSE Enterprise Linux Security Update for python39 (SUSE-SU-2023:2957-1)"},{"cve":"CVE-2007-4559","qid":"755840","title":"SUSE Enterprise Linux Security Update for python39 (SUSE-SU-2023:2641-1)"},{"cve":"CVE-2007-4559","qid":"755855","title":"SUSE Enterprise Linux Security Update for python311 (SUSE-SU-2023:2937-1)"},{"cve":"CVE-2007-4559","qid":"900115","title":"CBL-Mariner Linux Security Update for python2 2.7.18"},{"cve":"CVE-2007-4559","qid":"900180","title":"CBL-Mariner Linux Security Update for python3 3.7.10"},{"cve":"CVE-2007-4559","qid":"901696","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python2 (6822-1)"},{"cve":"CVE-2007-4559","qid":"901835","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python3 (6828)"},{"cve":"CVE-2007-4559","qid":"903355","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python3 (5430)"},{"cve":"CVE-2007-4559","qid":"903443","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python2 (3450)"},{"cve":"CVE-2007-4559","qid":"905788","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python2 (3450-1)"},{"cve":"CVE-2007-4559","qid":"908049","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python3 (6828-1)"},{"cve":"CVE-2007-4559","qid":"941360","title":"AlmaLinux Security Update for python3.9 (ALSA-2023:6659)"},{"cve":"CVE-2007-4559","qid":"941365","title":"AlmaLinux Security Update for python3.11 (ALSA-2023:6494)"},{"cve":"CVE-2007-4559","qid":"941377","title":"AlmaLinux Security Update for python-pip (ALSA-2023:6694)"},{"cve":"CVE-2007-4559","qid":"941378","title":"AlmaLinux Security Update for python3.11-pip (ALSA-2023:6324)"},{"cve":"CVE-2007-4559","qid":"941427","title":"AlmaLinux Security Update for python3.11 (ALSA-2023:7024)"},{"cve":"CVE-2007-4559","qid":"941445","title":"AlmaLinux Security Update for python-pip (ALSA-2023:7176)"},{"cve":"CVE-2007-4559","qid":"941446","title":"AlmaLinux Security Update for python3 (ALSA-2023:7151)"},{"cve":"CVE-2007-4559","qid":"941449","title":"AlmaLinux Security Update for python3.11-pip (ALSA-2023:6914)"},{"cve":"CVE-2007-4559","qid":"941465","title":"AlmaLinux Security Update for python38:3.8 and python38-devel:3.8 (ALSA-2023:7050)"},{"cve":"CVE-2007-4559","qid":"941467","title":"AlmaLinux Security Update for python39:3.9 and python39-devel:3.9 (ALSA-2023:7034)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T15:01:09.683Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/"},{"name":"26623","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/26623"},{"name":"ADV-2007-3022","tags":["vdb-entry","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3022"},{"tags":["x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=263261"},{"name":"[python-dev] 20070824 tarfile and directory traversal vulnerability","tags":["mailing-list","x_transferred"],"url":"http://mail.python.org/pipermail/python-dev/2007-August/074290.html"},{"name":"[python-dev] 20070825 tarfile and directory traversal vulnerability","tags":["mailing-list","x_transferred"],"url":"http://mail.python.org/pipermail/python-dev/2007-August/074292.html"},{"name":"GLSA-202309-06","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-06"},{"name":"FEDORA-2024-d1f1084584","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/"},{"name":"FEDORA-2024-ebb3c95344","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/"},{"name":"FEDORA-2024-46374d2703","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2007-4559","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-01-17T14:48:13.204984Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-01-17T14:48:23.199Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-08-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2024-03-23T02:06:38.035Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"26623","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/26623"},{"name":"ADV-2007-3022","tags":["vdb-entry"],"url":"http://www.vupen.com/english/advisories/2007/3022"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=263261"},{"name":"[python-dev] 20070824 tarfile and directory traversal vulnerability","tags":["mailing-list"],"url":"http://mail.python.org/pipermail/python-dev/2007-August/074290.html"},{"name":"[python-dev] 20070825 tarfile and directory traversal vulnerability","tags":["mailing-list"],"url":"http://mail.python.org/pipermail/python-dev/2007-August/074292.html"},{"name":"GLSA-202309-06","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-06"},{"name":"FEDORA-2024-d1f1084584","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/"},{"name":"FEDORA-2024-ebb3c95344","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/"},{"name":"FEDORA-2024-46374d2703","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/"}]}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-4559","datePublished":"2007-08-28T00:00:00.000Z","dateReserved":"2007-08-27T00:00:00.000Z","dateUpdated":"2025-01-17T14:48:23.199Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-08-28 01:17:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-22","n/a","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.16","matchCriteriaId":"230CAC0B-F126-4DE4-B789-3C77CBB31F8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.7.0","versionEndExcluding":"3.8.17","matchCriteriaId":"B5AD617D-8CD2-4DC8-84B1-D3FDF9F85607"},{"vulnerable":true,"criteria":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9.0","versionEndExcluding":"3.9.17","matchCriteriaId":"0287FC5A-256F-40EE-93D0-2DFFE38BB5A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10.0","versionEndExcluding":"3.10.12","matchCriteriaId":"4AA7FA11-C746-4E69-94C2-18E745D82054"},{"vulnerable":true,"criteria":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11.0","versionEndExcluding":"3.11.4","matchCriteriaId":"AD14A157-FEA9-411F-B338-F1B6F726599D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"4559","Ordinal":"1","Title":"CVE-2007-4559","CVE":"CVE-2007-4559","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"4559","Ordinal":"1","NoteData":"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.","Type":"Description","Title":"CVE-2007-4559"},{"CveYear":"2007","CveId":"4559","Ordinal":"2","NoteData":"2007-08-27","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"4559","Ordinal":"3","NoteData":"2007-11-06","Type":"Other","Title":"Modified"}]}}}