CVE-2022-23793: Path Traversal within joomla/archive tar class
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03186%
CWE
Published
3/31/2022
Updated
5/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
joomla/archive | composer | < 1.1.12 | 1.1.12 |
joomla/archive | composer | >= 2.0.0, < 2.0.1 | 2.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path sanitization during tar extraction. The Tar::extract
method is responsible for handling archive entries, and the advisory explicitly mentions the tar extractor as the vulnerable component. Path traversal occurs when processing malicious filenames
without normalization checks, a common failure pattern in CWE-22 scenarios. The high confidence comes from the direct match between the vulnerability description and the core responsibility of the extract
method in tar handling.