Описание
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
A flaw was found in the Archive_Tar package. PEAR Archive_Tar could allow a local authenticated attacker to bypass security restrictions caused by a stream-wrapper attack. An attacker can overwrite arbitrary files on the system using a specially-crafted tar archive.
Отчет
PHP 7.2, 7.3 and 7.4 are all deprecated. There would be no patches made available for php-pear.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | php-pear | Out of support scope | ||
Red Hat Enterprise Linux 8 | php:7.2/php-pear | Will not fix | ||
Red Hat Enterprise Linux 8 | php:7.3/php-pear | Will not fix | ||
Red Hat Software Collections | rh-php73-php-pear | Will not fix | ||
Red Hat Enterprise Linux 7 | php-pear | Fixed | RHSA-2022:7340 | 02.11.2022 |
Red Hat Enterprise Linux 8 | php | Fixed | RHSA-2022:6542 | 15.09.2022 |
Red Hat Enterprise Linux 8.4 Extended Update Support | php | Fixed | RHSA-2022:6541 | 15.09.2022 |
Показывать по
Дополнительная информация
Статус:
7.1 High
CVSS3
Связанные уязвимости
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
Archive_Tar through 1.4.10 has :// filename sanitization only to addre ...
Multiple vulnerabilities through filename manipulation in Archive_Tar
Уязвимость класса Archive_Tar библиотеки PHP классов PEAR, позволяющая нарушителю выполнить перезапись защищаемых файлов
7.1 High
CVSS3