First published: Thu May 30 2019(Updated: )
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/fstream | <1.0.12 | 1.0.12 |
debian/node-fstream | 1.0.12-4 1.0.12-7 | |
Moonlight | <1.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13173 has a medium severity level due to its potential for arbitrary file overwrites.
To fix CVE-2019-13173, upgrade fstream to version 1.0.12 or later.
CVE-2019-13173 affects versions of fstream prior to 1.0.12, including node-fstream packages from Debian.
Yes, due to the arbitrary file overwrite vulnerability, there is a risk of data loss when extracting tarballs.
Exploitation of CVE-2019-13173 requires local access to the system during the extraction of vulnerable tarballs.