CVE-2026-23950 (CNNVD-202601-3314)

HIGH
中文标题:
node-tar 安全漏洞
英文标题:
node-tar has Race Condition in Path Reservations via Unicode Ligature Collisions on macOS APFS
CVSS分数: 8.8
发布时间: 2026-01-20 00:40:48
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

node-tar是isaacs个人开发者的一款用于文件压缩/解压缩的软件包。 node-tar 7.5.3及之前版本存在安全漏洞,该漏洞源于Unicode路径冲突处理不完整,可能导致竞争条件,从而允许任意文件覆盖。

英文描述:

node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.

CWE类型:
CWE-176 CWE-367 CWE-352
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
isaacs node-tar < 7.5.4 - - cpe:2.3:a:isaacs:node-tar:<_7.5.4:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w x_refsource_CONFIRM
cve.org
访问
https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
机密性
LOW
完整性
HIGH
可用性
LOW
时间信息
发布时间:
2026-01-20 00:40:48
修改时间:
2026-01-20 00:40:48
创建时间:
2026-01-20 03:10:36
更新时间:
2026-01-27 06:00:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-23950 2026-01-20 02:19:58 2026-01-19 19:10:36
NVD nvd_CVE-2026-23950 2026-01-21 02:00:05 2026-01-20 22:00:20
CNNVD cnnvd_CNNVD-202601-3314 2026-01-26 02:10:03 2026-01-25 18:11:55
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2026-01-26 02:11:55
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202601-3314; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202601-3314
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-21 06:00:20
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']