Lucene search

K
ubuntuUbuntuUSN-5283-1
HistoryFeb 11, 2022 - 12:00 a.m.

Tar for Node.js vulnerability

2022-02-1100:00:00
ubuntu.com
70
node.js
tar
ubuntu 20.04
path inputs
directory traversal
unix

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

9.2

Confidence

High

EPSS

0.007

Percentile

80.2%

Releases

  • Ubuntu 20.04 LTS

Packages

  • node-tar - read and write portable tar archives module for Node.js

Details

It was discovered that Tar for Node.js did not properly sanitize path inputs.
An attacker could possibly use this issue to read arbitrary files, resulting
in a directory traversal attack.

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchnode-tar< 4.4.10+ds1-2ubuntu1+esm1UNKNOWN
Ubuntu20.04noarchnode-tar< 4.4.10+ds1-2ubuntu1UNKNOWN

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

9.2

Confidence

High

EPSS

0.007

Percentile

80.2%