Skip to content

Conversation

@miss-islington
Copy link
Contributor

@miss-islington miss-islington commented Aug 30, 2025

The Tools/ssl/multissltests.py script may extract a possibly untrusted tarball.
Since the script does not necessarily use Python 3.14 or later (where the "data"
filter became the default tarfile extraction filter), the user may theoretically
suffer from a path traversal attack.

Although the script should not be used in production and usually relies on downloading
trusted sources, the "data" extraction filter is now explicitly used wherever relevant.
(cherry picked from commit 31d3836)

Co-authored-by: Tommaso Bona [email protected]

…/ssl/multissltests.py` (pythonGH-138147)

The `Tools/ssl/multissltests.py` script may extract a possibly untrusted tarball.
Since the script does not necessarily use Python 3.14 or later (where the `"data"`
filter became the default `tarfile` extraction filter), the user may theoretically
suffer from a path traversal attack.

Although the script should not be used in production and usually relies on downloading
trusted sources, the `"data"` extraction filter is now explicitly used wherever relevant.
(cherry picked from commit 31d3836)

Co-authored-by: Tommaso Bona <[email protected]>
@hugovk hugovk merged commit b79bece into python:3.14 Aug 31, 2025
54 checks passed
kumaraditya303 pushed a commit to miss-islington/cpython that referenced this pull request Sep 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants