ghsa-2367-c296-3mp2
Vulnerability from github
Published
2021-08-25 20:43
Modified
2023-06-13 21:53
Severity ?
Summary
Arbitrary file overwrite in tar-rs
Details
When unpacking a tarball with the unpack_in-family of functions it's intended that only files within the specified directory are able to be written. Tarballs with hard links or symlinks, however, can be used to overwrite any file on the filesystem. Tarballs can contain multiple entries for the same file. A tarball which first contains an entry for a hard link or symlink pointing to any file on the filesystem will have the link created, and then afterwards if the same file is listed in the tarball the hard link will be rewritten and any file can be rewritten on the filesystem.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.4.16" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-20990" ], "database_specific": { "cwe_ids": [ "CWE-59" ], "github_reviewed": true, "github_reviewed_at": "2021-08-19T21:24:12Z", "nvd_published_at": null, "severity": "HIGH" }, "details": "When unpacking a tarball with the unpack_in-family of functions it\u0027s intended that only files within the specified directory are able to be written. Tarballs with hard links or symlinks, however, can be used to overwrite any file on the filesystem. Tarballs can contain multiple entries for the same file. A tarball which first contains an entry for a hard link or symlink pointing to any file on the filesystem will have the link created, and then afterwards if the same file is listed in the tarball the hard link will be rewritten and any file can be rewritten on the filesystem.", "id": "GHSA-2367-c296-3mp2", "modified": "2023-06-13T21:53:47Z", "published": "2021-08-25T20:43:54Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20990" }, { "type": "WEB", "url": "https://github.com/alexcrichton/tar-rs/pull/156" }, { "type": "WEB", "url": "https://github.com/alexcrichton/tar-rs/commit/54651a87ae6ba7d81fcc72ffdee2ea7eca2c7e85" }, { "type": "PACKAGE", "url": "https://github.com/alexcrichton/tar-rs" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2018-0002.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Arbitrary file overwrite in tar-rs" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.