Directory Traversal Affecting python38-lxml package, versions <0:4.4.1-7.module+el8.9.0+1418+f0d66789


Severity

Recommended
0.0
medium
0
10

Based on Rocky Linux security rating.

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
90.58% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ROCKY8-PYTHON38LXML-15307533
  • published18 Feb 2026
  • disclosed28 Aug 2007

Introduced: 28 Aug 2007

CVE-2007-4559  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 python38-lxml to version 0:4.4.1-7.module+el8.9.0+1418+f0d66789 or higher.
This issue was patched in RLSA-2023:7050.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python38-lxml package and not the python38-lxml package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.

CVSS Base Scores

version 3.1