Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-26960

Опубликовано: 20 фев. 2026
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

A flaw was found in node-tar. An attacker can craft a malicious archive that, when extracted with default options, creates a hardlink outside the intended extraction directory. This vulnerability allows the attacker to perform arbitrary file read and write operations as the user extracting the archive, bypassing existing path protections. This can lead to unauthorized access and modification of sensitive system files.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4io.cryostat-cryostatAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Will not fix
Network Observability Operatornetwork-observability/network-observability-console-plugin-rhel9Affected
Red Hat 3scale API Management Platform 23scale-amp20/systemAffected
Red Hat 3scale API Management Platform 23scale-amp21/systemAffected
Red Hat 3scale API Management Platform 23scale-amp22/systemAffected
Red Hat 3scale API Management Platform 23scale-amp24/systemAffected
Red Hat 3scale API Management Platform 23scale-amp25/systemAffected
Red Hat 3scale API Management Platform 23scale-amp26/systemAffected
Red Hat 3scale API Management Platform 23scale-amp2/system-rhel7Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2441253tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation

EPSS

Процентиль: 0%
0.00005
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 1 месяца назад

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

CVSS3: 7.1
nvd
около 1 месяца назад

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

msrc
около 1 месяца назад

node-tar has Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in Extraction

CVSS3: 7.1
debian
около 1 месяца назад

node-tar is a full-featured Tar for Node.js. When using default option ...

CVSS3: 7.1
github
около 1 месяца назад

Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction

EPSS

Процентиль: 0%
0.00005
Низкий

7.1 High

CVSS3