Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-31802

Опубликовано: 10 мар. 2026
Источник: debian
EPSS Низкий

Описание

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-tarnot-affectedpackage

Примечания

  • https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256

  • Fixed by: https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad (v7.5.11)

  • Vulnerability introduced by the upstream fixes for CVE-2026-23745, i.e. upstream's

  • https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e

  • https://github.com/isaacs/node-tar/commit/e9a1ddb821b29ddee75b9470dd511066148c8070

EPSS

Процентиль: 0%
0.00007
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
17 дней назад

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.

CVSS3: 6.2
redhat
17 дней назад

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.

CVSS3: 5.5
nvd
17 дней назад

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.

msrc
13 дней назад

node-tar Symlink Path Traversal via Drive-Relative Linkpath

github
16 дней назад

node-tar Symlink Path Traversal via Drive-Relative Linkpath

EPSS

Процентиль: 0%
0.00007
Низкий