7.5

CVE-2020-36193

Warnung

Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhpArchive Tar Version <= 1.4.11
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
FedoraprojectFedora Version35
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
DrupalDrupal Version >= 7.0 < 7.78
DrupalDrupal Version >= 8.9.0 < 8.9.13
DrupalDrupal Version >= 9.0.0 < 9.0.11
DrupalDrupal Version >= 9.1.0 < 9.1.3

25.08.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

PEAR Archive_Tar Improper Link Resolution Vulnerability

Schwachstelle

PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 86.02% 0.994
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.