GNU Tar Hostile Destination Path...

- AV AC AU C I A
发布: 2001-07-12
修订: 2025-04-13

GNU tar contains a vulnerability in the handling of pathnames for archived files. By specifying a path for an archived item that points outside the expected directory scope, an attacker can cause the file to be extracted to arbitrary locations on the filesystem, including paths containing system binaries and other sensitive or confidential information. By default, tar will overwrite existing files without warning the user. Since tar can override umask settings, the output file can be rendered executable. An attacker can exploit this issue to create or overwrite binaries in any desired location. The attacker may be able to elevate privileges, potentially to 'root'. Versions prior to GNU Tar 1.13.19 are affected.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息