Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-28949

Опубликовано: 19 нояб. 2020
Источник: debian
EPSS Критический

Описание

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
drupal7removedpackage
php-pearfixed1:1.10.9+submodules+notgz-1.1package

Примечания

  • https://github.com/pear/Archive_Tar/issues/33

  • https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da

  • https://www.drupal.org/sa-core-2020-013

EPSS

Процентиль: 100%
0.93057
Критический

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

CVSS3: 7.1
redhat
больше 4 лет назад

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

CVSS3: 7.8
nvd
больше 4 лет назад

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

CVSS3: 7.8
github
около 4 лет назад

Multiple vulnerabilities through filename manipulation in Archive_Tar

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость класса Archive_Tar библиотеки PHP классов PEAR, позволяющая нарушителю выполнить перезапись защищаемых файлов

EPSS

Процентиль: 100%
0.93057
Критический