{"id":"BIT-drupal-2020-28949","details":"Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.","aliases":["BIT-drupal-2020-28948","CVE-2020-28948","CVE-2020-28949","DRUPAL-CORE-2020-013","GHSA-75c5-f4gw-38r9","GHSA-jh5x-hfhg-78jq"],"modified":"2025-12-10T23:40:57.172131Z","published":"2024-03-06T10:56:00.687Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html"},{"type":"WEB","url":"https://github.com/pear/Archive_Tar/issues/33"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202101-23"},{"type":"WEB","url":"https://www.debian.org/security/2020/dsa-4817"},{"type":"WEB","url":"https://www.drupal.org/sa-core-2020-013"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28949"},{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-28949"}],"affected":[{"package":{"name":"drupal","ecosystem":"Bitnami","purl":"pkg:bitnami/drupal"},"ranges":[{"type":"SEMVER","events":[{"introduced":"7.0.0"},{"fixed":"7.75.0"},{"introduced":"8.0.0"},{"fixed":"8.9.10"},{"introduced":"9.0.0"},{"fixed":"9.0.9"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/drupal/BIT-drupal-2020-28949.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}