Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThis issue was found to be a duplicate.
The original vulnerability with details can be found [here](https://security.snyk.io/vuln/via the pull_package
API function. An attacker can execute arbitrary commands on the victim's machine by exploiting the project_wheel_metadata
function to execute the setup.py
file inside the tar file.
Note:
This vulnerability bypasses the protections newly implemented through the safe_extract()
function.).