-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2024-28863 - Medium Severity Vulnerability
Vulnerable Libraries - tar-5.0.5.tgz, tar-4.4.13.tgz
tar-5.0.5.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-5.0.5.tgz
Path to dependency file: /deps/npm/docs/package.json
Path to vulnerable library: /deps/npm/docs/package.json
Dependency Hierarchy:
- gatsby-plugin-manifest-2.2.34.tgz (Root Library)
- sharp-0.23.4.tgz
- ❌ tar-5.0.5.tgz (Vulnerable Library)
- sharp-0.23.4.tgz
tar-4.4.13.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-4.4.13.tgz
Path to dependency file: /deps/npm/package.json
Path to vulnerable library: /deps/npm/node_modules/tar/package.json
Dependency Hierarchy:
- ❌ tar-4.4.13.tgz (Vulnerable Library)
Found in HEAD commit: 00fdb00d5bdbaea4fec4642989374d82cbdb1a3c
Found in base branch: master
Vulnerability Details
node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
Publish Date: 2024-03-21
URL: CVE-2024-28863
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-f5x3-32g6-xq36
Release Date: 2024-03-21
Fix Resolution: tar - 6.2.1
Step up your Open Source Security Game with Mend here