​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-jwhw-mwv5-2f36

Published

Last updated

https://images.chainguard.dev/security/CGA-jwhw-mwv5-2f36
Package

nodejs-14

Latest Update
Fixed
Fixed Version

14.21.3-r1

Aliases
  • CVE-2024-28863
  • GHSA-f5x3-32g6-xq36

Severity

6.5

Medium

CVSS V3

Summary

Denial of service while parsing a tar file due to lack of folders count validation

Description

Description:

During some analysis today on npm's node-tar package I came across the folder creation process, Basicly if you provide node-tar with a path like this ./a/b/c/foo.txt it would create every folder and sub-folder here a, b and c until it reaches the last folder to create foo.txt, In-this case I noticed that there's no validation at all on the amount of folders being created, that said we're actually able to CPU and memory consume the system running node-tar and even crash the nodejs client within few seconds of running it using a path with too many sub-folders inside

Steps To Reproduce:

You can reproduce this issue by downloading the tar file I provided in the resources and using node-tar to extract it, you should get the same behavior as the video

Proof Of Concept:

Here's a video show-casing the exploit:

Impact

Denial of service by crashing the nodejs client when attempting to parse a tar archive, make it run out of heap memory and consuming server CPU and memory resources

Report resources

payload.txt archeive.tar.gz

Note

This report was originally reported to GitHub bug bounty program, they asked me to report it to you a month ago

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images