Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-1000888

Published: 28 December 2018

PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4.

Notes

AuthorNote
mdeslaur
the 1.4.4 release broke symlinks, see:
https://pear.php.net/bugs/bug.php?id=23788
1.4.5 was released with symlink fix
the regression is unrelated to the fix for this CVE

Priority

Medium

Cvss 3 Severity Score

8.8

Score breakdown

Status

Package Release Status
php-pear
Launchpad, Ubuntu, Debian
upstream
Released (1:1.10.6+submodules+notgz-1.1)
trusty Does not exist

xenial
Released (1:1.10.1+submodules+notgz-6ubuntu0.1)
bionic
Released (1:1.10.5+submodules+notgz-1ubuntu1.18.04.1)
cosmic
Released (1:1.10.5+submodules+notgz-1ubuntu1.18.10.1)
Patches:
upstream: https://github.com/pear/Archive_Tar/commit/59ace120ac5ceb5f0d36e40e48e1884de1badf76

Severity score breakdown

Parameter Value
Base score 8.8
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H