Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j4xf-2g29-59ph | tar-rs `unpack_in` can chmod arbitrary directories by following symlinks |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tar Project
Tar Project tar |
|
| CPEs | cpe:2.3:a:tar_project:tar:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Tar Project
Tar Project tar |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alexcrichton
Alexcrichton tar-rs |
|
| Vendors & Products |
Alexcrichton
Alexcrichton tar-rs |
Fri, 20 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat the symlink target as a valid existing directory — and subsequently apply chmod to it. This allows an attacker to modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in version 0.4.45. | |
| Title | tar-rs: unpack_in can chmod arbitrary directories by following symlinks | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T12:59:30.468Z
Reserved: 2026-03-17T18:10:50.213Z
Link: CVE-2026-33056
Updated: 2026-03-20T12:59:23.475Z
Status : Analyzed
Published: 2026-03-20T08:16:11.603
Modified: 2026-03-24T16:17:11.623
Link: CVE-2026-33056
OpenCVE Enrichment
Updated: 2026-03-20T10:36:54Z
Github GHSA