CVE-2024-28863 Affecting node-tar package, versions <6.1.13+~cs7.0.5-2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.21% (44th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-NODETAR-6478850
  • published22 Mar 2024
  • disclosed21 Mar 2024

Introduced: 21 Mar 2024

CVE-2024-28863  (opens in a new tab)

How to fix?

Upgrade Debian:13 node-tar to version 6.1.13+~cs7.0.5-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-tar package and not the node-tar package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.

CVSS Base Scores

version 3.1