tar@4.4.19 vulnerabilities

tar for node

  • latest version

    7.5.6

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 days ago

  • licenses detected

    • >=2.1.1 <7.5.2
  • Direct Vulnerabilities

    Known vulnerabilities in the tar package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Handling of Unicode Encoding

    tar is a full-featured Tar for Node.js.

    Affected versions of this package are vulnerable to Improper Handling of Unicode Encoding in Path Reservations via Unicode Sharp-S (ß) Collisions on macOS APFS. An attacker can overwrite arbitrary files by exploiting Unicode normalization collisions in filenames within a malicious tar archive on case-insensitive or normalization-insensitive filesystems.

    Note:

    This is only exploitable if the system is running on a filesystem such as macOS APFS or HFS+ that ignores Unicode normalization.

    How to fix Improper Handling of Unicode Encoding?

    Upgrade tar to version 7.5.4 or higher.

    <7.5.4
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    tar is a full-featured Tar for Node.js.

    Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to the lack of folders count validation during the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running the software and even crash the client within few seconds of running it using a path with too many sub-folders inside.

    How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

    Upgrade tar to version 6.2.1 or higher.

    <6.2.1