Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-32804 β€” AI Deep Analysis Summary

CVSS 8.2 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Path Traversal vulnerability in `node-tar` (npm package). πŸ“¦ **Consequences**: Due to insufficient absolute path cleaning, attackers can create or overwrite arbitrary files on the system.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). πŸ› **Flaw**: The library fails to properly sanitize absolute paths during extraction, allowing directory traversal attacks.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of the `node-tar` npm package. πŸ“‰ **Vendor**: npm. ⚠️ **Note**: Since `npm` itself uses `node-tar`, the npm tool is also indirectly affected by this vulnerability.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Create arbitrary files or overwrite existing ones. πŸ“‚ **Privileges**: Local access required, but can lead to system compromise.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Low to Medium. πŸ–±οΈ **Requirements**: Local Access (AV:L), Low Complexity (AC:L), No Privileges Required (PR:N), but User Interaction (UI:R) is needed (e.g., clicking a malicious link or running a command)…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exploit**: YES. πŸ“‚ **PoC Available**: A GitHub repository (`yamory/CVE-2021-32804`) provides Docker-based reproduction steps. πŸ’» **Proof**: Demonstrates overwriting `.bashrc` to execute commands upon `su node`.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `node-tar` versions in your `package-lock.json` or `node_modules`. πŸ› οΈ **Feature**: Check if your app extracts tarballs from untrusted sources.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: YES. πŸ“ **Patch**: Official commit `1f036ca23f64a547bdd6c79c1a44bc62e8115da4` on GitHub addresses the issue. πŸ”„ **Action**: Update `node-tar` to the patched version immediately.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Avoid extracting untrusted tar files. πŸ›‘ **Mitigation**: Implement strict path validation before extraction.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: HIGH. πŸ”΄ **Priority**: Critical for Node.js developers. ⏳ **Reason**: CVSS Score indicates High impact (C:H, I:H). Since npm is widely used, the attack surface is broad. Patch ASAP!