CVE-2024-8088 : PYTHON CPYTHON UP TO 3.13.0 ZIPFILE MODULE NAMELIST/ITERDIR/EXTRACTALL INFINITE LOOP

Description

There is a HIGH severity vulnerability affecting the CPython “zipfile” module. When iterating over names of entries in a zip archive (for example, methods of “zipfile.ZipFile” like “namelist()”, “iterdir()”, “extractall()”, etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

References

https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/

https://github.com/python/cpython/pull/122906

https://github.com/python/cpython/issues/122905

https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e

https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64

https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea

For More Information

CVERecord

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

Description zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db)

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with