-
-
Notifications
You must be signed in to change notification settings - Fork 31.7k
[Security] shutil unpack_archive docs should clarify the security implications #91783
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Linking documentation for future reference. I wonder if these documentation changes should be back-ported? Documentationtarfile: https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extract |
…chive (pythonGH-91844) (cherry picked from commit 4b297a9) Co-authored-by: Sam Ezeh <[email protected]>
We should backport docs improvements to at least all the bugfix branches. Since this is a security warning, we should even consider backporting to the security-only branches (3.7 and 3.8). |
…H-91844) (cherry picked from commit 4b297a9) Co-authored-by: Sam Ezeh <[email protected]>
…H-91844) (cherry picked from commit 4b297a9) Co-authored-by: Sam Ezeh <[email protected]>
…chive (pythonGH-91844) (cherry picked from commit 4b297a9) Co-authored-by: Sam Ezeh <[email protected]>
Documentation
The
tarfile
module is vulnerable to Tar Slip and various other symlink-related attacks. These are known issues that are currently being discussed in the community (see: #65308, #73974).While tarfile docs show prominent red boxes entitling developers to be careful with tarballs coming from untrusted sources, shutil unpack_archive says nothing about it. However, unpack_archive will leverage tarfile behind the scenes if it sees a .tar.gz (or similar) extension, hence causing unpack_archive inherit all tarfile's security issues.
On the other hand,
zipfile
is reasonably well protected against these problems. But I believe it's easy for developers to misuse unpack_archive under the assumption that it is equivalent to zipfile, and hence use it without properly sanitizing the input files. And as long as the application only receives zip files there will be no problem, but as soon as a malicious tar file is received, the vulnerabilities are triggered. The problem is that zipfile only accepts zip files, throwing an exception otherwise. But unpack_archive accepts many other formats as well as zip.The text was updated successfully, but these errors were encountered: