fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the systems file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fstream | Fstream_project | * | 1.0.12 (excluding) |
Node-fstream | Ubuntu | bionic | * |
Node-fstream | Ubuntu | cosmic | * |
Node-fstream | Ubuntu | devel | * |
Node-fstream | Ubuntu | disco | * |
Node-fstream | Ubuntu | eoan | * |
Node-fstream | Ubuntu | esm-apps/xenial | * |
Node-fstream | Ubuntu | focal | * |
Node-fstream | Ubuntu | groovy | * |
Node-fstream | Ubuntu | hirsute | * |
Node-fstream | Ubuntu | impish | * |
Node-fstream | Ubuntu | jammy | * |
Node-fstream | Ubuntu | trusty | * |
Node-fstream | Ubuntu | trusty/esm | * |
Node-fstream | Ubuntu | upstream | * |
Node-fstream | Ubuntu | xenial | * |