Search for packages
purl | pkg:deb/ubuntu/php-pear@1:1.10.5%2Bsubmodules%2Bnotgz-1ubuntu1 |
Next non-vulnerable version | 1:1.10.9+submodules+notgz-1ubuntu0.20.04.3 |
Latest non-vulnerable version | 1:1.10.9+submodules+notgz-1ubuntu0.20.04.3 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-dfmf-642c-aaaf
Aliases: CVE-2021-32610 GHSA-p8q8-jfcv-g2h2 |
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193. |
Affected by 0 other vulnerabilities. |
VCID-pk5w-rtgg-aaap
Aliases: CVE-2020-28948 GHSA-jh5x-hfhg-78jq |
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. |
Affected by 2 other vulnerabilities. |
VCID-rgfg-7sxy-aaar
Aliases: CVE-2018-1000888 GHSA-3q76-jq6m-573p |
PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4. |
Affected by 4 other vulnerabilities. |
VCID-unxt-vez2-aaad
Aliases: CVE-2020-36193 GHSA-rpw6-9xfx-jvcx |
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. |
Affected by 1 other vulnerability. |
VCID-xmkr-w4ma-aaan
Aliases: CVE-2020-28949 GHSA-75c5-f4gw-38r9 |
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. |
Affected by 2 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|