Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gc5v-m9x4-r6x2

Опубликовано: 25 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 4.4

Описание

Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

Impact

The requests.utils.extract_zipped_paths() utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one.

Affected usages

Standard usage of the Requests library is not affected by this vulnerability. Only applications that call extract_zipped_paths() directly are impacted.

Remediation

Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location.

If developers are unable to upgrade, they can set TMPDIR in their environment to a directory with restricted write access.

Пакеты

Наименование

requests

pip
Затронутые версииВерсия исправления

< 2.33.0

2.33.0

EPSS

Процентиль: 0%
0.00004
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-377

Связанные уязвимости

CVSS3: 4.7
redhat
7 дней назад

Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.

CVSS3: 4.4
nvd
7 дней назад

Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.

CVSS3: 4.4
msrc
4 дня назад

Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

CVSS3: 4.4
debian
7 дней назад

Requests is a HTTP library. Prior to version 2.33.0, the `requests.uti ...

EPSS

Процентиль: 0%
0.00004
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-377