CVE-2018-12015
Published: August 31, 2023Last modified: July 22, 2025
Description
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.5 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | HIGH |
| Availability impact | NONE |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | perl | Not affected (5.36.0-r2) |
| Stream | perl | Not affected (5.38.0-r0) | |
| Hardened Containers | 23 LTS | perl | Not affected (5.36.0-r2) |
| Stream | perl | Not affected (5.38.0-r0) |
References
- http://seclists.org/fulldisclosure/2019/Mar/49
- http://www.securityfocus.com/bid/104423
- http://www.securitytracker.com/id/1041048
- https://access.redhat.com/errata/RHSA-2019:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
- https://seclists.org/bugtraq/2019/Mar/42
- https://security.netapp.com/advisory/ntap-20180927-0001/
- https://support.apple.com/kb/HT209600
- https://usn.ubuntu.com/3684-1/
- https://usn.ubuntu.com/3684-2/
- https://www.debian.org/security/2018/dsa-4226
- https://www.oracle.com/security-alerts/cpujul2020.html