Description
dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory. However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3.
INFO
Published Date :
2026-03-06T20:37:42.354Z
Last Modified :
2026-03-09T20:54:30.453Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-29790 vulnerability.
| Vendors | Products |
|---|---|
| Dbt-labs |
|
| Getdbt |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-29790.