Search for packages
| purl | pkg:deb/debian/php-pear@1:1.10.6%2Bsubmodules%2Bnotgz-1.1%2Bdeb10u2 |
| Next non-vulnerable version | 1:1.10.13+submodules+notgz+2022032202-2 |
| Latest non-vulnerable version | 1:1.10.13+submodules+notgz+2022032202-2 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1skm-sxkd-fqay
Aliases: CVE-2020-36193 GHSA-rpw6-9xfx-jvcx |
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. |
Affected by 1 other vulnerability. |
|
VCID-29b3-euu3-tbdk
Aliases: CVE-2020-28948 GHSA-jh5x-hfhg-78jq |
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. |
Affected by 1 other vulnerability. |
|
VCID-zm7q-katz-bue7
Aliases: CVE-2020-28949 GHSA-75c5-f4gw-38r9 |
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1skm-sxkd-fqay | Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. |
CVE-2020-36193
GHSA-rpw6-9xfx-jvcx |
| VCID-29b3-euu3-tbdk | Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. |
CVE-2020-28948
GHSA-jh5x-hfhg-78jq |
| VCID-q1zc-wkc7-wyew | PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4. |
CVE-2018-1000888
GHSA-3q76-jq6m-573p |
| VCID-zm7q-katz-bue7 | Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. |
CVE-2020-28949
GHSA-75c5-f4gw-38r9 |