CVE-2024-12905: tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File
(updated )
An Improper Link Resolution Before File Access (“Link Following”) and Improper Limitation of a Pathname to a Restricted Directory (“Path Traversal”). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with index.js in the tar-fs package.
This issue affects tar-fs: from 0.0.0 before 1.16.4, from 2.0.0 before 2.1.2, from 3.0.0 before 3.0.7.
References
- arxiv.org/abs/2506.04962
- arxiv.org/pdf/2506.04962
- github.com/advisories/GHSA-pq67-2wwv-3xjx
- github.com/mafintosh/tar-fs
- github.com/mafintosh/tar-fs/commit/a1dd7e7c7f4b4a8bd2ab60f513baca573b44e2ed
- lists.debian.org/debian-lts-announce/2025/06/msg00012.html
- nvd.nist.gov/vuln/detail/CVE-2024-12905
- www.seal.security/blog/a-link-to-the-past-uncovering-a-new-vulnerability-in-tar-fs
Code Behaviors & Features
Detect and mitigate CVE-2024-12905 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →