Exploit for CVE-2024-8088

There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.





When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected.

Published: 2024-08-22

CVSS: 8.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:X/RE:L/U:X

Download Exploit for CVE-2024-8088 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://augustaverburg.nl/exploit-760-cve-2017-0263/

https://augustaverburg.nl/exploit-756-cve-2025-43529/

https://augustaverburg.nl/exploit-459-cve-2025-29087/