Логотип exploitDog
bind:"GHSA-8rrh-rw8j-w5fx" OR bind:"CVE-2026-24049"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-8rrh-rw8j-w5fx" OR bind:"CVE-2026-24049"

Количество 16

Количество 16

github логотип

GHSA-8rrh-rw8j-w5fx

2 месяца назад

Wheel Affected by Arbitrary File Permission Modification via Path Traversal in wheel unpack

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2026-24049

2 месяца назад

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2026-24049

2 месяца назад

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2026-24049

2 месяца назад

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2026-24049

2 месяца назад

wheel is a command line tool for manipulating Python wheel files, as d ...

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20147-1

около 2 месяцев назад

Security update for python-wheel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0460-1

около 2 месяцев назад

Security update for python-wheel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0425-1

около 2 месяцев назад

Security update for python313-wheel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0424-1

около 2 месяцев назад

Security update for python-wheel

EPSS: Низкий
rocky логотип

RLSA-2026:2090

около 2 месяцев назад

Important: python3.12-wheel security update

EPSS: Низкий
rocky логотип

RLSA-2026:1939

около 2 месяцев назад

Important: python3.12-wheel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-2090

около 2 месяцев назад

ELSA-2026-2090: python3.12-wheel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1939

около 2 месяцев назад

ELSA-2026-1939: python3.12-wheel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1902

около 2 месяцев назад

ELSA-2026-1902: python-wheel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2026-03593

2 месяца назад

Уязвимость инструмента командной строки для работы с файлами Wheel, связанная с неверным ограничением имени пути к каталогу, позволяющая нарушителю повысить свои привилегии или выполнить произвольный код

CVSS3: 7.1
EPSS: Низкий
redos логотип

ROS-20260310-73-0035

19 дней назад

Уязвимость python-wheel

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-8rrh-rw8j-w5fx

Wheel Affected by Arbitrary File Permission Modification via Path Traversal in wheel unpack

CVSS3: 7.1
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2026-24049

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
0%
Низкий
2 месяца назад
redhat логотип
CVE-2026-24049

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
0%
Низкий
2 месяца назад
nvd логотип
CVE-2026-24049

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVSS3: 7.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2026-24049

wheel is a command line tool for manipulating Python wheel files, as d ...

CVSS3: 7.1
0%
Низкий
2 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20147-1

Security update for python-wheel

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0460-1

Security update for python-wheel

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0425-1

Security update for python313-wheel

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0424-1

Security update for python-wheel

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:2090

Important: python3.12-wheel security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:1939

Important: python3.12-wheel security update

0%
Низкий
около 2 месяцев назад
oracle-oval логотип
ELSA-2026-2090

ELSA-2026-2090: python3.12-wheel security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1939

ELSA-2026-1939: python3.12-wheel security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1902

ELSA-2026-1902: python-wheel security update (IMPORTANT)

около 2 месяцев назад
fstec логотип
BDU:2026-03593

Уязвимость инструмента командной строки для работы с файлами Wheel, связанная с неверным ограничением имени пути к каталогу, позволяющая нарушителю повысить свои привилегии или выполнить произвольный код

CVSS3: 7.1
0%
Низкий
2 месяца назад
redos логотип
ROS-20260310-73-0035

Уязвимость python-wheel

CVSS3: 5.5
0%
Низкий
19 дней назад

Уязвимостей на страницу