Directory traversal vulnerability in PEAR::Archive_Tar 1.2, and other versions before 1.3.2, allows remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a TAR archive.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.hamid.ir/security/phptar.txt | vendor advisory |
http://pear.php.net/bugs/bug.php?id=6933 | |
http://www.osvdb.org/23481 | vdb entry |
http://www.vupen.com/english/advisories/2006/0728 | vdb entry |
http://www.securityfocus.com/archive/1/425967/100/0/threaded | mailing list |
http://secunia.com/advisories/19011 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/16805 | vdb entry |
http://pear.php.net/package/Archive_Tar/download/ |