Vulnerability identifier: #VU58204
Vulnerability risk: Medium
Exploitation vector: Network
Vendor: npm Inc.
The vulnerability allows a remote attacker to overwrite arbitrary files on the system.
The vulnerability exists due insufficient logic on Windows systems when extracting tar files that contained a path that
was not an absolute path, but specified a drive letter different from
the extraction target, such as
C:some\path. If the drive letter does not match the extraction target, for example
D:\extraction\dir, then the result of
path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the
C: drive, rather than the extraction target directory.
Install update from vendor's website.
Vulnerable software versions
tar: 4.0.0 - 6.1.8
Fixed software versions
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?