CVE-2020-28949

PEAR Archive_Tar — PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability
⚠️ CVSS 3.1  7.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949; https://nvd.nist.gov/vuln/detail/CVE-2020-28949

Key Details

PropertyValue
CVE ID CVE-2020-28949
Vendor / Product PEAR — Archive_Tar
NVD Published2020-11-19
NVD Last Modified2025-11-07
CVSS 3.1 Score7.8
CVSS 3.1 VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SeverityHIGH
CISA KEV Added2022-08-25
CISA KEV Deadline2022-09-15
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2022-09-15. Apply updates per vendor instructions.

Timeline

DateEvent
2022-08-25Added to CISA Known Exploited Vulnerabilities catalog
2022-09-15CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2020-28949 Vulnerability Database
CISA KEV Catalog Entry US Government