PT-2026-3329 · Node-Tar · Node-Tar
Jvr2022
·
Published
2026-01-16
·
Updated
2026-03-13
·
CVE-2026-23745
CVSS v4.0
8.2
High
| AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N |
Name of the Vulnerable Software and Affected Versions
node-tar versions <= 7.5.2
Description
The node-tar library fails to sanitize the
linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false, which is the default secure behavior. This allows malicious archives to bypass extraction root restrictions, potentially leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. The vulnerability exists within the src/unpack.ts file, specifically in the [HARDLINK] and [SYMLINK] methods. A malicious archive can create a hardlink to a sensitive file on the host and potentially overwrite it, if file permissions allow. Additionally, the library allows the creation of symbolic links pointing to sensitive absolute system paths or traversing paths, even with secure extraction defaults.Recommendations
Update to node-tar version 7.5.3 or later.
Exploit
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Node-Tar