Directory Traversal Affecting python-tk package, versions <2.7.17-7.52.2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES152-PYTHONTK-2690703
- published 14 Apr 2022
- disclosed 9 Feb 2021
Introduced: 9 Feb 2021
CVE-2019-20916 Open this link in a new tabHow to fix?
Upgrade SLES:15.2 python-tk to version 2.7.17-7.52.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-tk package and not the python-tk package as distributed by SLES.
See How to fix? for SLES:15.2 relevant fixed versions and status.
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
References
- https://www.suse.com/security/cve/CVE-2019-20916.html
- https://bugzilla.suse.com/1176262
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace
- https://github.com/pypa/pip/compare/19.1.1...19.2
- https://github.com/pypa/pip/issues/6413
- https://www.oracle.com/security-alerts/cpujul2022.html