dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory. However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3.
References
| Link | Resource |
|---|---|
| https://github.com/dbt-labs/dbt-common/commit/e547954a48bac9394ef6eb98432e429dce9a7709 | Patch |
| https://github.com/dbt-labs/dbt-common/security/advisories/GHSA-w75w-9qv4-j5xj | Mitigation Vendor Advisory |
| https://github.com/pypa/pip/pull/13777 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-06 21:16
Updated : 2026-03-13 18:31
NVD link : CVE-2026-29790
Mitre link : CVE-2026-29790
CVE.ORG link : CVE-2026-29790
JSON object : View
Products Affected
getdbt
- dbt-common
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
