TARmageddon flaw in abandoned Rust library enables RCE attacks
Rust库async-tar及其分支存在高危漏洞(CVE-2025-62518),可能导致远程代码执行。该漏洞源于TAR文件解析中的脱节问题,攻击者可注入恶意档案条目。受影响项目包括tokio-tar等广泛使用的库。尽管部分分支已修复,但未修复版本仍存风险。建议开发者升级或移除易受攻击的依赖。 2025-10-22 17:30:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

Hacker

A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code execution on systems running unpatched software.

Tracked as CVE-2025-62518, this logic flaw results from a desynchronization issue that allows unauthenticated attackers to inject additional archive entries during TAR file extraction.

This occurs specifically when processing nested TAR files with mismatched ustar and PAX extended headers, causing the parser to jump into the file content and mistake it for tar headers, leading to the extraction of attacker-supplied files.

Edera, the cybersecurity company that discovered the vulnerability and dubbed it TARmageddon, explains that threat actors can exploit it to overwrite files in supply chain attacks by replacing configuration files and hijacking build backends.

This security flaw affects not only projects using async-tar but also tokio-tar, an extremely popular fork with over 7 million downloads on crates.io that has also been abandoned.

While the active forks have already been patched, Edera says it's not possible to accurately estimate the impact of this vulnerability due to the widespread nature of its forks, including tokio-tar.

"Due to the widespread nature of tokio-tar in various forms, it is not possible to truly quantify upfront the blast radius of this bug across the ecosystem," said Edera.

"While the active forks have been successfully patched (see also Astral Security Advisory), this disclosure highlights a major systemic challenge: the highly downloaded tokio-tar remains unpatched."

The TARmageddon vulnerability affects many widely used projects, including Binstalk, Astral's uv Python package manager, the wasmCloud universal application platform, liboxen, and the open-source testcontainers library.

While some of the downstream projects Edera contacted have announced plans to remove the vulnerable dependency or switch to a patched fork, others have not responded, and more projects that haven't been notified are likely also using it.

Edera advises developers to either upgrade to a patched version or immediately remove the vulnerable tokio-tar dependency. They should switch to the actively maintained astral-tokio-tar fork if their projects depend on the vulnerable tokio-tar library. Edera's async-tar fork (krata-tokio-tar) will be archived to reduce confusion in the ecosystem.


文章来源: https://www.bleepingcomputer.com/news/security/tarmageddon-flaw-in-abandoned-rust-library-enables-rce-attacks/
如有侵权请联系:admin#unsafe.sh