CVE-2020-28949

HIGH KEV RANSOMWARE

Archive_Tar <1.4.10 - Code Injection

Title source: llm

Description

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

Exploits (2)

vulncheck_xdb WORKING POC
client-side
https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949
metasploit WORKING POC EXCELLENT
by gwillcox-r7, xorathustra · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/fileformat/archive_tar_arb_file_write.rb

References (13)

Scores

CVSS v3 7.8
EPSS 0.9296
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-08-25
VulnCheck KEV 2022-08-25
InTheWild.io 2022-08-25
ENISA EUVD EUVD-2021-0783
Ransomware Use Confirmed

Classification

Status published

Affected Products (9)

php/archive_tar < 1.4.12
debian/debian_linux
debian/debian_linux
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
drupal/drupal < 7.75
pear/archive_tar < 1.4.11Packagist

Timeline

Published Nov 19, 2020
KEV Added Aug 25, 2022
Tracked Since Feb 18, 2026