Количество 20
Количество 20

CVE-2021-32803
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then repl...

CVE-2021-32803
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then repl...

CVE-2021-32803
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replaci
CVE-2021-32803
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4 ...
GHSA-r628-mhmh-qjhw
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning

BDU:2022-00226
Уязвимость модуля Node.js для обработки tar архивов Node-tar, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании

openSUSE-SU-2022:0715-1
Security update for nodejs14

openSUSE-SU-2022:0704-1
Security update for nodejs8

openSUSE-SU-2022:0657-1
Security update for nodejs12

SUSE-SU-2022:0715-1
Security update for nodejs14

SUSE-SU-2022:0704-1
Security update for nodejs8

SUSE-SU-2022:0657-1
Security update for nodejs12

SUSE-SU-2022:0569-1
Security update for nodejs14

SUSE-SU-2022:0563-1
Security update for nodejs8

SUSE-SU-2022:0531-1
Security update for nodejs12

SUSE-SU-2022:0570-1
Security update for nodejs10

RLSA-2021:3623
Important: nodejs:12 security and bug fix update
ELSA-2021-3666
ELSA-2021-3666: nodejs:14 security and bug fix update (IMPORTANT)
ELSA-2021-3623
ELSA-2021-3623: nodejs:12 security and bug fix update (IMPORTANT)

SUSE-SU-2022:1717-1
Security update for nodejs10
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-32803 The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then repl... | CVSS3: 8.2 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-32803 The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then repl... | CVSS3: 8.1 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-32803 The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replaci | CVSS3: 8.2 | 0% Низкий | почти 4 года назад |
CVE-2021-32803 The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4 ... | CVSS3: 8.2 | 0% Низкий | почти 4 года назад | |
GHSA-r628-mhmh-qjhw Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning | CVSS3: 8.2 | 0% Низкий | почти 4 года назад | |
![]() | BDU:2022-00226 Уязвимость модуля Node.js для обработки tar архивов Node-tar, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании | CVSS3: 8.1 | 0% Низкий | почти 4 года назад |
![]() | openSUSE-SU-2022:0715-1 Security update for nodejs14 | больше 3 лет назад | ||
![]() | openSUSE-SU-2022:0704-1 Security update for nodejs8 | больше 3 лет назад | ||
![]() | openSUSE-SU-2022:0657-1 Security update for nodejs12 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0715-1 Security update for nodejs14 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0704-1 Security update for nodejs8 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0657-1 Security update for nodejs12 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0569-1 Security update for nodejs14 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0563-1 Security update for nodejs8 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0531-1 Security update for nodejs12 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0570-1 Security update for nodejs10 | больше 3 лет назад | ||
![]() | RLSA-2021:3623 Important: nodejs:12 security and bug fix update | больше 3 лет назад | ||
ELSA-2021-3666 ELSA-2021-3666: nodejs:14 security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-3623 ELSA-2021-3623: nodejs:12 security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:1717-1 Security update for nodejs10 | около 3 лет назад |
Уязвимостей на страницу