Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-1000888 — Deserialization of Untrusted Data in Archive TAR
Severity
8.8HIGHNVD
EPSS
29.5%
top 3.39%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 28
Latest updateJul 7
Description
PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class its…
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 18.10
🔴Vulnerability Details
5GHSA▶
Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data↗2019-12-02
💥Exploits & PoCs
1📋Vendor Advisories
4Debian▶
CVE-2018-1000888: php-pear - PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerabi...↗2018
💬Community
3Bugzilla▶
CVE-2018-1000888 php-pear: Unsafe deserialization of data in Archive_Tar class [fedora-all]↗2019-01-25