GHSA-3jfq-g458-7qm9
HIGH
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
Published August 3, 2021Updated February 4, 2026Source: osv
Details
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`.
This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
### Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.
```js
const path = require('path')
const tar = require('tar')
tar.x({
file: 'archive.tgz',
// either add this function...
onentry: (entry) => {
if (path.isAbsolute(entry.path)) {
entry.path = sanitizeAbsolutePathSomehow(entry.path)
entry.absolute = path.resolve(entry.path)
}
},
// or this one
filter: (file, entry) => {
if (path.isAbsolute(entry.path)) {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
Remediation
Upgrade to the fixed version using your package manager.
npm
Update tar to 6.1.1 or laternpm install tar@6.1.1
npm
Update tar to 5.0.6 or laternpm install tar@5.0.6
npm
Update tar to 4.4.14 or laternpm install tar@4.4.14
npm
Update tar to 3.2.2 or laternpm install tar@3.2.2
After upgrading, run your dependency scanner again to confirm the vulnerability is resolved.
Affected Packages (4)
Vulnerability Classification
Common Weakness Enumeration (CWE) identifiers for this vulnerability type.
- CWE-22Path TraversalMITRE
CVSS Score Breakdown
What the CVSS (Common Vulnerability Scoring System) 3.1 score means for each attack dimension.
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
References
- https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9WEB
- https://nvd.nist.gov/vuln/detail/CVE-2021-32804ADVISORY
- https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4WEB
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfWEB
- https://github.com/npm/node-tarPACKAGE
- https://www.npmjs.com/advisories/1770WEB
- https://www.npmjs.com/package/tarWEB
- https://www.oracle.com/security-alerts/cpuoct2021.htmlWEB
Risk Assessment
CVSS Score
3.1
Exploitation is difficult or impact is minor. Address in your next planned update.
EPSS Score (30-day exploit probability)
84.98%
Higher than 99% of vulnerabilities
Also Known As
Check if you're affected
Scan your dependencies to see if this vulnerability affects your projects.
Scan Your Dependencies