Archive_Tar through 1.4.10 has ://
filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file://
to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html
github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml
github.com/pear/Archive_Tar
github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
github.com/pear/Archive_Tar/issues/33
lists.debian.org/debian-lts-announce/2020/11/msg00045.html
lists.fedoraproject.org/archives/list/[email protected]/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR
lists.fedoraproject.org/archives/list/[email protected]/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B
lists.fedoraproject.org/archives/list/[email protected]/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437
lists.fedoraproject.org/archives/list/[email protected]/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT
lists.fedoraproject.org/archives/list/[email protected]/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP
lists.fedoraproject.org/archives/list/[email protected]/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N
nvd.nist.gov/vuln/detail/CVE-2020-28949
security.gentoo.org/glsa/202101-23
www.debian.org/security/2020/dsa-4817
www.drupal.org/sa-core-2020-013