mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
26 lines
1.7 KiB
Markdown
26 lines
1.7 KiB
Markdown
### [CVE-2024-12905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12905)
|
|

|
|

|
|

|
|

|
|
&color=brightgreen)
|
|
&color=brightgreen)
|
|
|
|
### Description
|
|
|
|
An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with index.js in the tar-fs package.This issue affects tar-fs: from 0.0.0 before 1.16.4, from 2.0.0 before 2.1.2, from 3.0.0 before 3.0.8.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.seal.security/blog/a-link-to-the-past-uncovering-a-new-vulnerability-in-tar-fs
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
|
- https://github.com/theMcSam/CVE-2024-12905-PoC
|
|
- https://github.com/w4zu/Debian_security
|
|
- https://github.com/zulloper/cve-poc
|
|
|