{"id":"CVE-2024-28863","summary":"node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation","details":"node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.","aliases":["GHSA-f5x3-32g6-xq36"],"modified":"2026-04-10T05:12:06.187063Z","published":"2024-03-21T22:10:23.603Z","related":["ALSA-2024:5814","ALSA-2024:6147","ALSA-2024:6148","CGA-h8j6-gcq9-7g8p"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-400","CWE-770"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28863.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28863.json"},{"type":"ADVISORY","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240524-0005/"},{"type":"FIX","url":"https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isaacs/node-tar","events":[{"introduced":"0"},{"fixed":"bef7b1e4ffab822681fea2a9b22187192ed14717"}]}],"versions":["0.1.0","0.1.10","0.1.11","0.1.12","0.1.13","0.1.2","0.1.3","0.1.5","0.1.6","0.1.7","0.1.8","0.1.9","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.20","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v2.0.0","v2.0.1","v2.1.0","v2.1.1","v2.2.1","v3.0.0","v3.0.1","v3.1.0","v3.1.1","v3.1.10","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9","v3.2.0","v4.0.0","v4.0.1","v4.0.2","v4.1.0","v4.1.1","v4.1.2","v4.2.0","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.4.0","v4.4.1","v4.4.10","v4.4.11","v4.4.12","v4.4.13","v4.4.2","v4.4.3","v4.4.4","v4.4.5","v4.4.6","v4.4.7","v4.4.8","v4.4.9","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v6.0.0","v6.0.1","v6.0.2","v6.0.3","v6.0.4","v6.0.5","v6.1.0","v6.1.1","v6.1.10","v6.1.11","v6.1.12","v6.1.13","v6.1.14","v6.1.15","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.1.9","v6.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28863.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}