Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33056: CWE-61: UNIX Symbolic Link (Symlink) Following in alexcrichton tar-rs

0
Medium
VulnerabilityCVE-2026-33056cvecve-2026-33056cwe-61
Published: Fri Mar 20 2026 (03/20/2026, 07:11:10 UTC)
Source: CVE Database V5
Vendor/Project: alexcrichton
Product: tar-rs

Description

CVE-2026-33056 is a medium severity vulnerability in the Rust tar-rs library versions prior to 0. 4. 45. The flaw arises from the unpack_dir function using fs::metadata(), which follows symbolic links, to check if a path is a directory. An attacker can craft a tar archive containing a symlink followed by a directory entry with the same name, causing the library to mistakenly treat the symlink target as a directory and apply chmod permissions to it. This allows modification of permissions on arbitrary directories outside the intended extraction root. Exploitation requires no privileges but does require user interaction to unpack a malicious tarball. No known exploits are currently reported in the wild. The issue has been fixed in version 0. 4.

AI-Powered Analysis

AILast updated: 03/20/2026, 07:54:07 UTC

Technical Analysis

The vulnerability CVE-2026-33056 affects the tar-rs Rust library, specifically versions 0.4.44 and earlier. The tar-rs library is used for reading and writing tar archives in Rust applications. The root cause lies in the unpack_dir function, which attempts to verify if a path already exists as a directory by calling fs::metadata(). However, fs::metadata() follows symbolic links rather than inspecting the symlink itself. An attacker can craft a tarball containing a symbolic link entry followed by a directory entry with the same name. When unpack_dir processes this tarball, it interprets the symlink target as an existing directory and applies chmod operations to it. This unintended behavior allows the attacker to modify permissions of arbitrary directories outside the extraction root, potentially altering access controls on sensitive system directories or files. The vulnerability does not require any privileges or authentication but does require the victim to unpack a malicious tar archive. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction. No known exploits have been reported in the wild as of the publication date. The issue was addressed in tar-rs version 0.4.45 by correcting the directory existence check to avoid following symlinks improperly.

Potential Impact

This vulnerability can lead to unauthorized modification of directory permissions outside the intended extraction directory, potentially weakening system security controls. If exploited, an attacker could escalate privileges indirectly by making sensitive directories writable or executable, facilitating further attacks such as code execution or data tampering. The impact is particularly significant for applications that automatically unpack tar archives from untrusted sources or in automated CI/CD pipelines. While the vulnerability does not directly allow code execution or data disclosure, the permission changes can be leveraged as part of a broader attack chain. Organizations using Rust applications or libraries that depend on tar-rs for archive extraction are at risk, especially if they process untrusted tar files. The lack of authentication and low attack complexity increase the risk, but the requirement for user interaction (unpacking the archive) limits remote exploitation scenarios. No known active exploitation reduces immediate risk but patching is critical to prevent future attacks.

Mitigation Recommendations

The primary mitigation is to upgrade the tar-rs library to version 0.4.45 or later, where the vulnerability is fixed. For organizations unable to upgrade immediately, consider implementing strict validation and sanitization of tar archives before unpacking, including rejecting archives containing symbolic links or entries with conflicting names. Employ sandboxing or containerization for processes that unpack archives to limit the impact of potential permission changes. Monitor file system permissions on critical directories for unexpected changes. Additionally, restrict the sources of tar archives to trusted parties and educate users about the risks of unpacking untrusted archives. Incorporate static or dynamic analysis tools to detect usage of vulnerable tar-rs versions in codebases. Finally, maintain up-to-date backups to recover from any unintended permission modifications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.213Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcf9b8e32a4fbe5f3bdae1

Added to database: 3/20/2026, 7:39:36 AM

Last enriched: 3/20/2026, 7:54:07 AM

Last updated: 3/20/2026, 8:45:59 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses