fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
References
Configurations
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html - | |
References | () https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/4123-1/ - | |
References | () https://www.npmjs.com/advisories/886 - Patch, Vendor Advisory |
Information
Published : 2019-07-02 20:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13173
Mitre link : CVE-2019-13173
CVE.ORG link : CVE-2019-13173
JSON object : View
Products Affected
fstream_project
- fstream
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')