8.8
CVSSv3

CVE-2018-1000888

Published: 28/12/2018 Updated: 15/06/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

PEAR Archive_Tar version 1.4.3 and previous versions contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php pear archive tar

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 16.04

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #919147 php-pear: CVE-2018-1000888 Package: src:php-pear; Maintainer for src:php-pear is Debian PHP PEAR Maintainers <pkg-php-pear@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 13 Jan 2019 08:15:01 UTC Severity: grave Tags: patch, security, upstrea ...
PEAR could be made to run programs if it processed a specially crafted file ...
PEAR Archive_Tar version 143 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc) When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `pha ...
PEAR Archive_Tar version 143 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc) When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `pha ...

Exploits

PEAR Archive_Tar < 144 - PHP Object Injection Date: January 10, 2019 Author: farisv Vendor Homepage: pearphpnet/package/Archive_Tar/ Vulnerable Package Link: downloadpearphpnet/package/Archive_Tar-143tgz CVE: CVE-2018-1000888 In PEAR Archive_Tar before 144, there are several file operation with `$v_head ...
PEAR Archive_Tar versions prior to 144 suffers from a php object injection vulnerability ...

Recent Articles

Got a Drupal-powered website? You may want to get patching now...
The Register • Shaun Nichols in San Francisco • 18 Jan 2019

Open-source CMS gets a pair of critical fixes Drupal drisputes dreport of widespread wide-open websites – whoa

Drupal has issued a pair of updates to address two security vulnerabilities in its online publishing platform. The vulns are a little esoteric, and will not affect most sites, but it's good to patch just in case you later add functionality that can be exploited. Both Drupal.org and US-CERT are advising admins to test and install the two Drupal core fixes, both concerning flaws that can be exploited to perform remote-code execution. As their bug ID numbers would suggest, the updates are the first...