7.8

CVE-2020-28949

Warnung
Exploit

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhpArchive Tar Version < 1.4.12
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
FedoraprojectFedora Version35
DrupalDrupal Version >= 7.0 < 7.75
DrupalDrupal Version >= 8.0.0 < 8.9.10
DrupalDrupal Version >= 8.8.0 < 8.8.12
DrupalDrupal Version >= 9.0.0 < 9.0.9

25.08.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability

Schwachstelle

PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.06% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
https://github.com/pear/Archive_Tar/issues/33
Vendor Advisory
Exploit
Issue Tracking
https://www.debian.org/security/2020/dsa-4817
Third Party Advisory
Mailing List