606
VMScore

CVE-2020-28948

Published: 19/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Archive_Tar up to and including 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php archive tar

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

fedoraproject fedora 35

drupal drupal

Vendor Advisories

Synopsis Moderate: php:74 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the php:74 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as ...
Synopsis Moderate: php-pear security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for php-pear is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a ...
Synopsis Moderate: php:74 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the php:74 module is now available for Red Hat Enterprise Linux 84 Extended Update SupportRed Hat Product Security ...
Debian Bug report logs - #980428 Disallow symlinks to out-of-path filenames (CVE-2020-36193) Package: php-pear; Maintainer for php-pear is Debian PHP Maintainers <team+pkg-php@trackerdebianorg>; Source for php-pear is src:php-pear (PTS, buildd, popcon) Reported by: David Prévot <taffit@debianorg> Date: Tue, 19 Ja ...
Debian Bug report logs - #976108 php-pear: CVE-2020-28948 CVE-2020-28949 Package: src:php-pear; Maintainer for src:php-pear is Debian PHP Maintainers <team+pkg-php@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 29 Nov 2020 19:51:02 UTC Severity: grave Tags: security, upstream F ...
Two vulnerabilities were discovered in the PEAR Archive_Tar package for handling tar files in PHP, potentially allowing a remote attacker to execute arbitrary code or overwrite files For the stable distribution (buster), these problems have been fixed in version 1:1106+submodules+notgz-11+deb10u1 We recommend that you upgrade your php-pear pac ...
Archive_Tar through 1410 allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) Archive_Tar through 1410 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed (CVE-2020-28949) ...
Archive_Tar through 1410 allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) Archive_Tar through 1410 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed (CVE-2020-28949) ...

Github Repositories

CVE-2020-28948-and-CVE-2020-28949 pear/Archive_Tar#33 cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2020-28948 for more learn iblackhatcom/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-Itpdf

POC for CVE-2020-28948 & CVE-2020-28949 The files here contain PoC for CVE-2020-28948 & CVE-2020-28949 to achieve remote exploit The server The server folder contains a simple upload server which uses the vulnerable Archive_Tar library, located in server/Archive The server accepts a Tar archive from the user, extracts and store it in the server/uploads/ folder

CVE-2020-28948 POC Link: githubcom/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949