CVE-2020-36193
Known Exploited Vulnerability Entry External Catalog
Entry Details
Confirmed
Yes
2022-08-25 00:00 UTC
Timestamps
2022-08-25
2022-08-25
Scope
KEV entry: PEAR Archive_Tar Improper Link Resolution Vulnerability | Affected: PEAR / Archive_Tar | Description: PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux. | Required action: Apply updates per vendor instructions. | Due date: 2022-09-15 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193; https://nvd.nist.gov/vuln/detail/CVE-2020-36193
References
- {'id': 'CVE-2020-36193', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-36193'}
39b694f3-12b7-4a4c-bf16-a301ab6d6d40
405284c2-e461-4670-8979-7fd2c9755a60
2026-02-02 13:25 UTC
2026-02-06 07:53 UTC
Evidence (1)
| Type | Source | Signal | Confidence | Details | GCVE Metadata |
|---|---|---|---|---|---|
| vendor_report | cisa-kev | successful_exploitation | 0.80 |
View details
|
- |