{"uuid": "d72fe2d2-84ae-4ff9-bd66-905ece63c012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8248", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-6232\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\n\ud83d\udccf Published: 2024-09-03T12:29:00.102Z\n\ud83d\udccf Modified: 2025-03-20T18:02:26.275Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/pull/121286\n2. https://github.com/python/cpython/issues/121285\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/\n4. https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06\n5. https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4\n6. https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf\n7. https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373\n8. https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d\n9. https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877\n10. https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4", "creation_timestamp": "2025-03-20T18:20:45.000000Z"}