![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2018-1000888 |
Description: | PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.704378 1.3.6.1.4.1.25623.1.1.2.2019.1147 1.3.6.1.4.1.25623.1.0.891674 1.3.6.1.4.1.25623.1.0.843870 1.3.6.1.4.1.25623.1.1.2.2019.1121 1.3.6.1.4.1.25623.1.0.891685 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-1000888 Debian Security Information: DSA-4378 (Google Search) https://www.debian.org/security/2019/dsa-4378 https://www.exploit-db.com/exploits/46108/ https://security.gentoo.org/glsa/202006-14 https://blog.ripstech.com/2018/new-php-exploitation-technique/ https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf https://lists.debian.org/debian-lts-announce/2019/02/msg00020.html https://usn.ubuntu.com/3857-1/ |