October 2022

15 Year Old Python Bug Let Hacker Execute Code in Code 350k Python Projects

The Trellix Advanced Threat Research team has detected a 15-year-old Python bug found in the Python tarfile module, which is monitored as CVE-6.8-2007 with CVSS:4559 evaluation. The vulnerability is a path bypass attack on the extract and extractall functions in the tarfile module that allows an attacker to overwrite arbitrary files. ”. It is sorted by file names in the tar archive,” says Trellix security researcher Casimir Schultz. After successfully exploiting the vulnerability, the attacker may have had access to write the execution code of the file. Tarfile vulnerability reports state that tarfile files are a collection of many different files and metadata that are then used to open the tarfile file. In this case, attackers can take advantage of the error by downloading a malicious tarfile that allows it to exit the folder from which you want to extract the file and execute the code. The Tarfile module allows users to add a filter that they can use to parse and modify a file’s metadata before adding it to the TAR archive. This makes it easier for attackers to build their exploits with small lines of code. “The security code could not be written to clear the participants’ files before the tarfile was called. () extract the tarfile file. extractall (), leads to a vulnerability that allows the attacker to bypass access to the file system directory– – Trellix security vulnerability researcher Charles McFarland, Python tarfil the eject function of the module is based on the information in the object passed to the function explicitly trust and extraction TarInfo joins the road, and a bypass that allows the attacker to execute the attack tarinfo object in a directory name. The path that joins the filename Also depends on the extractall function extraction function, experts say that the extractall function is also vulnerable to a directory bypass attack.

Automatic Cheating Detection in Human Racing

This is a fascinating look into the future of automated fraud detection in sports: Maybe you’ve heard the really crazy discussions about fraud in athletics? Philadelphia Eagles forward Devon Allen was disqualified from the 110-meter hurdles at the World Athletics Championships a few weeks ago for a false start. Here’s the problem: you can’t see a false start. No one can see a false start. When he sees Allen, he definitely can’t reach for the gun. But here’s the thing: World Athletics has determined that someone cannot be pushed out of a block in a tenth of a second from a pistol without a false start. They have a science that shows that it is beyond human capabilities to react so quickly. Of course, there are people who tell you that this is nonsense (I am one of them), this is pseudoscience, in no way they can restrict human abilities in this way. There is a science that shows that it is humanly impossible to hit a fastball. Once upon a time, science proved that people could not pass a kilometer in four minutes. By the way, do you know what Devon Allen’s reaction time is? Dec. This took 0.99 seconds. According to world athletics science, one thousandth of a second is faster than necessary. They certainly know that. 01 seconds – and definitely .