tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File
High severity
GitHub Reviewed
Published
Mar 27, 2025
to the GitHub Advisory Database
•
Updated Mar 28, 2025
Package
Affected versions
< 1.16.4
>= 2.0.0, < 2.1.2
>= 3.0.0, < 3.0.7
Patched versions
1.16.4
2.1.2
3.0.8
Description
Published by the National Vulnerability Database
Mar 27, 2025
Published to the GitHub Advisory Database
Mar 27, 2025
Reviewed
Mar 28, 2025
Last updated
Mar 28, 2025
An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with index.js in the tar-fs package.
This issue affects tar-fs: from 0.0.0 before 1.16.4, from 2.0.0 before 2.1.2, from 3.0.0 before 3.0.7.
References