pear/archive_tar is vulnerable to PHAR unserialization. The vulnerability exists due to the improper validation of filename that allows a filename that starts with PHAR://
to be executed.
packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html
github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da
github.com/pear/Archive_Tar/issues/33
lists.debian.org/debian-lts-announce/2020/11/msg00045.html
lists.fedoraproject.org/archives/list/[email protected]/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/
lists.fedoraproject.org/archives/list/[email protected]/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/
lists.fedoraproject.org/archives/list/[email protected]/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/
lists.fedoraproject.org/archives/list/[email protected]/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/
lists.fedoraproject.org/archives/list/[email protected]/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/
lists.fedoraproject.org/archives/list/[email protected]/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/
security.gentoo.org/glsa/202101-23
www.debian.org/security/2020/dsa-4817
www.drupal.org/sa-core-2020-013