Pip Vulnerable to Path Traversal via Lack of Symbolic Link Validation in 'unpacking.py' File
37147
03 March 2026
03 March 2026
CLOSED
MEDIUM
5.9
CVE-2025-8869
|
Brocade Security Advisory ID |
BSA-2026-3245 |
|
Component |
pip |
|
|
|
Summary
Pip is vulnerable to path traversal due to a lack of validation for symbolic links when Pip is used with instances of python which do not implement PEP 706. This could allow a remote attacker to extract a tar file outside of the intended directory.
Products Affected
- Brocade SANnav base OS (OVA deployment) before 3.0.0
- Brocade ASCG before 3.4.0
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Component_not_present] - Brocade SANnav standard deployment
[VEX Justification: Vulnerable_code_not_in_execute_path] - Brocade SANnav base OS (OVA deployment) version 3.0.0
[VEX Justification: Vulnerable_code_not_in_execute_path]
Solution
- Solution provided in Brocade ASCG 3.4.0
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
March 3, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.