You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
CVE-2018-20834 - High Severity Vulnerability
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-2.2.1.tgz
Dependency Hierarchy:
Found in HEAD commit: 7c3567c7b8d78dce0fcb947eca5db3cca195eb19
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
Publish Date: 2019-04-30
URL: CVE-2018-20834
Base Score Metrics:
Type: Change files
Origin: isaacs/node-tar@7ecef07
Release Date: 2019-05-15
Fix Resolution: Replace or update the following files: bad-link.tar, parse.js, link-file-entry-collision.js, package.json, bad-link.hex
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: