Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-02880

Опубликовано: 31 авг. 2021
Источник: fstec
CVSS3: 8.6
CVSS2: 6.9
EPSS Низкий

Описание

Уязвимость модуля Node.js для обработки tar архивов Node-tar связана с недостатками ограничения имени пути к каталогу. Эксплуатация уязвимости может позволить нарушителю загрузить произвольные файлы и выполнить произвольный код

Вендор

Сообщество свободного программного обеспечения
Red Hat Inc.
Novell Inc.
Node.js Foundation
Oracle Corp.
АО "НППКТ"

Наименование ПО

Debian GNU/Linux
Red Hat Enterprise Linux
OpenSUSE Leap
node-tar
GraalVM Enterprise Edition
ОСОН ОСнова Оnyx

Версия ПО

9 (Debian GNU/Linux)
8 (Red Hat Enterprise Linux)
10 (Debian GNU/Linux)
15.2 (OpenSUSE Leap)
15.3 (OpenSUSE Leap)
11 (Debian GNU/Linux)
8.4 Extended Update Support (Red Hat Enterprise Linux)
до 4.4.16 (node-tar)
от 5.0.0 до 5.0.8 (node-tar)
от 6.0.0 до 6.1.7 (node-tar)
20.3.3 (GraalVM Enterprise Edition)
21.2.0 (GraalVM Enterprise Edition)
до 2.7 (ОСОН ОСнова Оnyx)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 9
Red Hat Inc. Red Hat Enterprise Linux 8
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Novell Inc. OpenSUSE Leap 15.2
Novell Inc. OpenSUSE Leap 15.3
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Red Hat Inc. Red Hat Enterprise Linux 8.4 Extended Update Support
АО "НППКТ" ОСОН ОСнова Оnyx до 2.7

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,9)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций
Для Node-tar:
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2021-37701
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37701.xml
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2021-37701
Для программных продуктов Oracle Corp.:
https://www.oracle.com/security-alerts/cpuoct2021.html
Для ОСОН ОСнова Оnyx (версия 2.7):
Обновление программного обеспечения node-tar до версии 4.4.6+ds1-3+deb10u2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 2%
0.00016
Низкий

8.6 High

CVSS3

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 4 года назад

The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus pos...

CVSS3: 8.1
redhat
почти 4 года назад

The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus pos...

CVSS3: 8.2
nvd
почти 4 года назад

The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possib

CVSS3: 8.2
debian
почти 4 года назад

The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, an ...

CVSS3: 8.2
github
почти 4 года назад

Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links

EPSS

Процентиль: 2%
0.00016
Низкий

8.6 High

CVSS3

6.9 Medium

CVSS2