-
Notifications
You must be signed in to change notification settings - Fork 2
Description
CVE-2024-28863 - Medium Severity Vulnerability
Vulnerable Libraries - tar-6.1.11.tgz, tar-4.4.19.tgz, tar-2.2.2.tgz, tar-4.4.13.tgz
tar-6.1.11.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-6.1.11.tgz
Dependency Hierarchy:
- npm-8.19.2.tgz (Root Library)
- ❌ tar-6.1.11.tgz (Vulnerable Library)
tar-4.4.19.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-4.4.19.tgz
Path to dependency file: /apm/package.json
Path to vulnerable library: /apm/node_modules/npm/node_modules/tar/package.json
Dependency Hierarchy:
- atom-package-manager-2.6.5.tgz (Root Library)
- npm-6.14.17.tgz
- ❌ tar-4.4.19.tgz (Vulnerable Library)
- npm-6.14.17.tgz
tar-2.2.2.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-2.2.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- archive-view-https://www.atom.io/api/packages/archive-view/versions/0.65.2/tarball.tgz (Root Library)
- ls-archive-1.3.4.tgz
- ❌ tar-2.2.2.tgz (Vulnerable Library)
- ls-archive-1.3.4.tgz
tar-4.4.13.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-4.4.13.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- github-https://www.atom.io/api/packages/github/versions/0.34.2/tarball.tgz (Root Library)
- dugite-1.88.2.tgz
- ❌ tar-4.4.13.tgz (Vulnerable Library)
- dugite-1.88.2.tgz
Found in HEAD commit: 808ed16784ca49c0e5810becefba198982d2916e
Found in base branch: electron-upgrade
Vulnerability Details
node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
Publish Date: 2024-03-21
URL: CVE-2024-28863
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-f5x3-32g6-xq36
Release Date: 2024-03-21
Fix Resolution: tar - 6.2.1
Step up your Open Source Security Game with Mend here