Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33056: CWE-61: UNIX Symbolic Link (Symlink) Following in alexcrichton tar-rs

0
Medium
VulnerabilityCVE-2026-33056cvecve-2026-33056cwe-61
Published: Fri Mar 20 2026 (03/20/2026, 07:11:10 UTC)
Source: CVE Database V5
Vendor/Project: alexcrichton
Product: tar-rs

Description

tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat the symlink target as a valid existing directory — and subsequently apply chmod to it. This allows an attacker to modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in version 0.4.45.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 07:54:07 UTC

Technical Analysis

The vulnerability CVE-2026-33056 affects the tar-rs Rust library, specifically versions 0.4.44 and earlier. The tar-rs library is used for reading and writing tar archives in Rust applications. The root cause lies in the unpack_dir function, which attempts to verify if a path already exists as a directory by calling fs::metadata(). However, fs::metadata() follows symbolic links rather than inspecting the symlink itself. An attacker can craft a tarball containing a symbolic link entry followed by a directory entry with the same name. When unpack_dir processes this tarball, it interprets the symlink target as an existing directory and applies chmod operations to it. This unintended behavior allows the attacker to modify permissions of arbitrary directories outside the extraction root, potentially altering access controls on sensitive system directories or files. The vulnerability does not require any privileges or authentication but does require the victim to unpack a malicious tar archive. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction. No known exploits have been reported in the wild as of the publication date. The issue was addressed in tar-rs version 0.4.45 by correcting the directory existence check to avoid following symlinks improperly.

Potential Impact

This vulnerability can lead to unauthorized modification of directory permissions outside the intended extraction directory, potentially weakening system security controls. If exploited, an attacker could escalate privileges indirectly by making sensitive directories writable or executable, facilitating further attacks such as code execution or data tampering. The impact is particularly significant for applications that automatically unpack tar archives from untrusted sources or in automated CI/CD pipelines. While the vulnerability does not directly allow code execution or data disclosure, the permission changes can be leveraged as part of a broader attack chain. Organizations using Rust applications or libraries that depend on tar-rs for archive extraction are at risk, especially if they process untrusted tar files. The lack of authentication and low attack complexity increase the risk, but the requirement for user interaction (unpacking the archive) limits remote exploitation scenarios. No known active exploitation reduces immediate risk but patching is critical to prevent future attacks.

Mitigation Recommendations

The primary mitigation is to upgrade the tar-rs library to version 0.4.45 or later, where the vulnerability is fixed. For organizations unable to upgrade immediately, consider implementing strict validation and sanitization of tar archives before unpacking, including rejecting archives containing symbolic links or entries with conflicting names. Employ sandboxing or containerization for processes that unpack archives to limit the impact of potential permission changes. Monitor file system permissions on critical directories for unexpected changes. Additionally, restrict the sources of tar archives to trusted parties and educate users about the risks of unpacking untrusted archives. Incorporate static or dynamic analysis tools to detect usage of vulnerable tar-rs versions in codebases. Finally, maintain up-to-date backups to recover from any unintended permission modifications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.213Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcf9b8e32a4fbe5f3bdae1

Added to database: 3/20/2026, 7:39:36 AM

Last enriched: 3/20/2026, 7:54:07 AM

Last updated: 5/3/2026, 10:41:19 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses