Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-25645

Опубликовано: 25 мар. 2026
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

Requests is a HTTP library. Prior to version 2.33.0, the requests.utils.extract_zipped_paths() utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call extract_zipped_paths() directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set TMPDIR in their environment to a directory with restricted write access.

A flaw was found in the requests HTTP library, specifically in the requests.utils.extract_zipped_paths() function, which is used to load Certificate Authority (CA) bundles. A local attacker can exploit this vulnerability by pre-creating a malicious CA bundle file in the system's temporary directory. When a vulnerable application initializes the requests library, it may load this malicious file instead of the legitimate CA bundle, leading to a bypass of security controls and potential integrity compromise.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/bitwarden-sdk-server-rhel9Fix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-operator-bundleFix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-operator-rhel9Fix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-rhel9Fix deferred
Lightspeed Corelightspeed-core/dataverse-exporter-rhel9Fix deferred
Lightspeed Corelightspeed-core/lightspeed-stack-rhel9Fix deferred
Lightspeed Corelightspeed-core/rag-tool-rhel9Fix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-curator5-rhel9Fix deferred
Migration Toolkit for Containersrhmtc/openshift-migration-rhel8-operatorFix deferred
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-rhel9-operatorFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-379
https://bugzilla.redhat.com/show_bug.cgi?id=2451408requests: Requests: Security bypass due to predictable temporary file creation

EPSS

Процентиль: 0%
0.00004
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
nvd
7 дней назад

Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.

CVSS3: 4.4
msrc
4 дня назад

Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

CVSS3: 4.4
debian
7 дней назад

Requests is a HTTP library. Prior to version 2.33.0, the `requests.uti ...

CVSS3: 4.4
github
7 дней назад

Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

EPSS

Процентиль: 0%
0.00004
Низкий

4.7 Medium

CVSS3