Hi Tar team,

I was wondering if you had a chance to look at
https://nvd.nist.gov/vuln/detail/CVE-2025-45582 which suggests way to work
around the protection mechanism of "Member name contains '..'" with
creating a symlink to a directory in the first tarball and writing files to
it (though the symlink) in the second tarball.

There's demo code and video at
https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md

While it's somewhat complex to exploit this CVE and requires some user
steps, the demo still shows it can lead to very undesired results.

I would expect the second extract in their demo would require using this
flag:
       -h, --dereference
              Follow symlinks; archive and dump the files they point to.

But directory symlink might be an edge case (or bug in this CVE context).

Thanks,

Kaplan

Reply via email to