{"id":"CVE-2018-12015","details":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.","modified":"2026-04-11T12:06:53.686645Z","published":"2018-06-07T13:29:00.240Z","related":["SUSE-SU-2018:1972-1","SUSE-SU-2018:1972-2","SUSE-SU-2018:1977-1","SUSE-SU-2018:1992-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","extracted_events":[{"last_affected":"2.28"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","extracted_events":[{"fixed":"10.14.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"12.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"14.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"17.10"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2019/Mar/49"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104423"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041048"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2097"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Mar/42"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT209600"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3684-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3684-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4226"},{"type":"FIX","url":"https://security.netapp.com/advisory/ntap-20180927-0001/"},{"type":"EVIDENCE","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/perl/perl5","events":[{"introduced":"0"},{"last_affected":"c5b1997939178730653db9e80f90cd53d722fe8d"}],"database_specific":{"cpe":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"5.26.2"}],"source":"CPE_FIELD"}}],"versions":["GitLive-blead","if-0.0603","if-0.0604","if-0.0605","perl-1.0","perl-2.0","perl-3.000","perl-3.044","perl-4.0.00","perl-4.0.36","perl-5.000","perl-5.000o","perl-5.001","perl-5.001n","perl-5.002","perl-5.002_01","perl-5.003","perl-5.005","perl-5.6.0","perl-5.7.0","perl-5.7.1","perl-5.7.2","perl-5.7.3","perl-5.8.0","perl-5.9.0","perl-5.9.1","perl-5.9.2","perl-5.9.3","perl-5.9.4","perl-5.9.5","perl-5a2","perl-5a9","v5.10.0","v5.11.0","v5.11.1","v5.11.3","v5.11.4","v5.11.5","v5.12.0","v5.12.0-RC0","v5.12.0-RC1","v5.12.0-RC2","v5.12.0-RC3","v5.12.0-RC4","v5.12.0-RC5","v5.13.0","v5.13.1","v5.13.10","v5.13.11","v5.13.2","v5.13.3","v5.13.4","v5.13.5","v5.13.6","v5.13.7","v5.13.8","v5.13.9","v5.14.0","v5.14.0-RC1","v5.14.0-RC2","v5.14.0-RC3","v5.15.0","v5.15.1","v5.15.2","v5.15.3","v5.15.4","v5.15.5","v5.15.9","v5.16.0","v5.16.0-RC1","v5.16.0-RC2","v5.17.0","v5.17.2","v5.17.4","v5.17.6","v5.17.7","v5.17.7.0","v5.17.8","v5.17.9","v5.18.0","v5.18.0-RC1","v5.18.0-RC2","v5.18.0-RC3","v5.18.0-RC4","v5.19.0","v5.19.1","v5.19.11","v5.19.2","v5.19.3","v5.19.5","v5.19.7","v5.20.0","v5.20.0-RC1","v5.21.0","v5.21.1","v5.21.10","v5.21.11","v5.21.4","v5.21.5","v5.21.6","v5.21.8","v5.21.9","v5.22.0","v5.22.0-RC1","v5.22.0-RC2","v5.23.0","v5.23.1","v5.23.2","v5.23.3","v5.23.4","v5.23.6","v5.23.7","v5.24.0","v5.24.0-RC1","v5.24.0-RC2","v5.24.0-RC3","v5.24.0-RC4","v5.24.0-RC5","v5.25.0","v5.25.11","v5.25.2","v5.25.3","v5.25.4","v5.25.5","v5.25.7","v5.25.9","v5.26.0","v5.26.0-RC2","v5.26.1","v5.26.1-RC1","v5.26.2","v5.26.2-RC1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-12015.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}