Vulnerability Name: | CVE-2020-28949 (CCN-192115) | ||||||||||||||||||
Assigned: | 2020-11-17 | ||||||||||||||||||
Published: | 2020-11-17 | ||||||||||||||||||
Updated: | 2022-01-06 | ||||||||||||||||||
Summary: | Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. | ||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
6.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-74 CWE-20 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-28949 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html Source: XF Type: UNKNOWN archivetar-cve202028949-sec-bypass(192115) Source: CCN Type: Archive_Tar GIT Repository Multiple vulnerabilities through filename manipulation #33 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/pear/Archive_Tar/issues/33 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20201127 [SECURITY] [DLA 2466-1] drupal7 security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-0c013f520c Source: FEDORA Type: Third Party Advisory FEDORA-2020-f351eb14e3 Source: FEDORA Type: Third Party Advisory FEDORA-2020-d50d74d6f2 Source: FEDORA Type: Third Party Advisory FEDORA-2020-6f1079934c Source: FEDORA Type: Third Party Advisory FEDORA-2020-5271a896ff Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-8093e197f4 Source: CCN Type: Packet Storm Security [01-25-2021] PEAR Archive_Tar Arbitrary File Write Source: GENTOO Type: Third Party Advisory GLSA-202101-23 Source: DEBIAN Type: Third Party Advisory DSA-4817 Source: CCN Type: SA-CORE-2020-013 Drupal core - Critical - Arbitrary PHP code execution Source: CONFIRM Type: Third Party Advisory https://www.drupal.org/sa-core-2020-013 Source: CCN Type: Rapid7 Vulnerability and Exploit Database [01-25-2021] PEAR Archive_Tar 1.4.10 Arbitrary File Write Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-28949 | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |