8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.007 Low
EPSS
Percentile
79.9%
The npm package “tar” (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15,
and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via
insufficient symlink protection. node-tar
aims to guarantee that any file
whose location would be modified by a symbolic link is not extracted. This
is, in part, achieved by ensuring that extracted directories are not
symlinks. Additionally, in order to prevent unnecessary stat
calls to
determine whether a given path is a directory, paths are cached when
directories are created. This logic was insufficient when extracting tar
files that contained both a directory and a symlink with the same name as
the directory. This order of operations resulted in the directory being
created and added to the node-tar
directory cache. When a directory is
present in the directory cache, subsequent calls to mkdir for that
directory are skipped. However, this is also where node-tar
checks for
symlinks occur. By first creating a directory, and then replacing that
directory with a symlink, it was thus possible to bypass node-tar
symlink
checks on directories, essentially allowing an untrusted tar file to
symlink into an arbitrary location and subsequently extracting arbitrary
files into that location, thus allowing arbitrary file creation and
overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and
6.1.2.
github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
launchpad.net/bugs/cve/CVE-2021-32803
nvd.nist.gov/vuln/detail/CVE-2021-32803
security-tracker.debian.org/tracker/CVE-2021-32803
ubuntu.com/security/notices/USN-5283-1
www.cve.org/CVERecord?id=CVE-2021-32803
www.npmjs.com/advisories/1771
www.npmjs.com/package/tar
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.007 Low
EPSS
Percentile
79.9%