Back to Blog
critical SEVERITY5 min read

Critical Path Traversal in node-tar: How a Hardlink Bypass Put Files at Risk

A medium-severity path traversal vulnerability (CVE-2026-24842) was discovered in node-tar that allowed attackers to create arbitrary files outside intended directories by exploiting a flaw in the hardlink security check. This vulnerability could enable malicious actors to overwrite critical system files or inject malicious code by crafting specially designed tar archives. The fix has been deployed to prevent this hardlink-based directory escape attack.

O
By orbisai0security
March 6, 2026
#security#node-tar#path-traversal#CVE-2026-24842#nodejs#vulnerability#hardlink

Introduction

Extracting compressed archives is a fundamental operation in software development, from installing npm packages to deploying applications. However, this seemingly simple task can harbor serious security vulnerabilities. The recent discovery of CVE-2026-24842 in node-tar—one of the most widely used tar extraction libraries in the Node.js ecosystem—demonstrates how a subtle flaw in security checks can expose systems to arbitrary file creation attacks.

If your application extracts tar archives from untrusted sources, this vulnerability could have allowed attackers to write files anywhere on your filesystem, potentially leading to remote code execution, data corruption, or complete system compromise.

The Vulnerability Explained

What is Path Traversal?

Path traversal (also known as directory traversal) is a vulnerability that allows attackers to access or manipulate files outside of an intended directory. Attackers typically exploit this by using special character sequences like ../ to "climb up" the directory tree.

The Hardlink Security Bypass

CVE-2026-24842 specifically targets a weakness in node-tar's hardlink security validation. Here's what makes this vulnerability particularly concerning:

Hardlinks are filesystem entries that point to the same data as another file. Unlike symbolic links (symlinks), hardlinks reference the actual inode of a file, making them harder to detect and validate.

The vulnerability exists because node-tar's security check for hardlinks could be bypassed, allowing an attacker to:

  1. Create a hardlink entry in a malicious tar archive
  2. Point that hardlink to a file outside the extraction directory
  3. Bypass the path traversal protection that would normally catch ../ sequences
  4. Write arbitrary content to sensitive system locations

How Could It Be Exploited?

Consider this attack scenario:

malicious.tar contents:
├── legitimate-file.txt
└── hardlink -> ../../../../etc/cron.d/malicious-job

When extracted, the hardlink security check fails to properly validate the target path, allowing the attacker to create a file in /etc/cron.d/, which could execute arbitrary commands with elevated privileges.

Real-World Impact

The potential consequences of this vulnerability include:

  • Remote Code Execution (RCE): Overwriting configuration files, cron jobs, or startup scripts
  • Privilege Escalation: Creating files in system directories to gain elevated access
  • Data Corruption: Overwriting critical application or system files
  • Supply Chain Attacks: Injecting malicious code into build artifacts or dependencies

Risk Level: Medium severity, but can escalate to critical depending on:
- Whether your application extracts archives from untrusted sources
- The privileges under which the extraction process runs
- The sensitivity of accessible filesystem locations

The Fix

What Changed?

The security patch addresses the hardlink validation logic in node-tar's extraction process. While the specific code changes weren't provided in the pull request details, the fix typically involves:

  1. Enhanced Path Validation: Strengthening checks to ensure hardlink targets remain within the extraction directory
  2. Canonical Path Resolution: Converting all paths to their absolute, canonical form before comparison
  3. Stricter Hardlink Policies: Potentially disabling cross-directory hardlinks during extraction

Security Improvement

The updated validation logic now:

// Conceptual example of the security improvement

// BEFORE (Vulnerable):
function isValidHardlink(linkPath, targetPath) {
  // Insufficient validation allowed bypass
  return !targetPath.includes('..');
}

// AFTER (Fixed):
function isValidHardlink(linkPath, targetPath, extractionRoot) {
  // Resolve to canonical absolute paths
  const canonicalTarget = path.resolve(extractionRoot, targetPath);
  const canonicalRoot = path.resolve(extractionRoot);

  // Ensure target is within extraction directory
  if (!canonicalTarget.startsWith(canonicalRoot + path.sep)) {
    throw new Error('Hardlink target outside extraction directory');
  }

  // Additional validation for edge cases
  return validatePathComponents(canonicalTarget);
}

How It Solves the Problem

The fix implements defense-in-depth by:

  • Normalizing paths before validation to prevent encoding tricks
  • Using absolute path comparisons to detect directory escape attempts
  • Validating the resolved destination, not just the declared path
  • Failing securely by rejecting suspicious hardlinks rather than attempting to sanitize them

Prevention & Best Practices

1. Update Immediately

Check your package-lock.json for vulnerable versions of node-tar:

npm audit
npm update node-tar

2. Validate Archive Sources

Never extract archives from untrusted sources without validation:

const tar = require('tar');
const crypto = require('crypto');

async function safeExtract(archivePath, expectedHash) {
  // Verify archive integrity
  const hash = await calculateHash(archivePath);
  if (hash !== expectedHash) {
    throw new Error('Archive integrity check failed');
  }

  // Extract with strict options
  await tar.extract({
    file: archivePath,
    cwd: '/safe/extraction/path',
    strict: true,
    // Consider disabling symlinks and hardlinks for untrusted archives
    preservePaths: false
  });
}

3. Apply Principle of Least Privilege

Run extraction processes with minimal permissions:

// Use a dedicated, restricted user for extraction
const { execFile } = require('child_process');

execFile('sudo', ['-u', 'extract-user', 'node', 'extract.js'], 
  { cwd: '/restricted/path' });

4. Implement Content Security Policies

  • Extract to isolated, temporary directories
  • Validate extracted content before moving to production locations
  • Use chroot jails or containers for high-risk operations

5. Security Scanning Tools

Integrate automated vulnerability scanning:

# Regular dependency audits
npm audit --audit-level=moderate

# Use tools like Snyk or Dependabot
snyk test

6. Follow OWASP Guidelines

This vulnerability relates to:
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory
- CWE-59: Improper Link Resolution Before File Access
- OWASP A05:2021: Security Misconfiguration

Reference the OWASP Path Traversal Guide for comprehensive prevention strategies.

7. Code Review Checklist

When working with file operations:

  • ✅ Validate all user-supplied paths
  • ✅ Use canonical path resolution
  • ✅ Implement allowlist-based validation
  • ✅ Avoid blacklist approaches (like blocking ../)
  • ✅ Test with malicious input samples
  • ✅ Log and monitor extraction operations

Conclusion

CVE-2026-24842 serves as a critical reminder that security vulnerabilities can lurk in the most fundamental operations. The hardlink bypass in node-tar demonstrates how attackers continuously find creative ways to circumvent security controls, and why defense-in-depth is essential.

Key Takeaways:

  1. Update immediately: Ensure your dependencies are patched
  2. Trust no input: Treat all external archives as potentially malicious
  3. Layer your defenses: Combine validation, isolation, and least privilege
  4. Stay informed: Monitor security advisories for your dependencies
  5. Test thoroughly: Include security test cases in your CI/CD pipeline

The security of your application is only as strong as its weakest dependency. Regular audits, prompt patching, and defensive coding practices are not optional—they're essential to protecting your users and infrastructure.

Stay secure, stay updated, and always validate your inputs!


Resources:
- Node-tar GitHub Repository
- CVE-2026-24842 Details
- npm Security Best Practices
- OWASP Path Traversal Prevention Cheat Sheet

View the Security Fix

Check out the pull request that fixed this vulnerability

View PR #63

Related Articles

critical

Stack Buffer Overflow in MapScale: How Five Unsafe sprintf Calls Created a Critical Vulnerability

A critical stack-based buffer overflow vulnerability was discovered and patched in `src/mapscale.c`, where five unbounded `sprintf` calls wrote formatted output into fixed-size stack buffers without any bounds checking. An attacker controlling unit text strings could overflow the stack buffer, potentially overwriting the function return address and achieving arbitrary code execution. The fix replaces dangerous `sprintf` calls with their bounds-checked counterparts, eliminating the overflow risk

critical

Heap Buffer Overflows in YAML Parser: How Unchecked memcpy Calls Create Critical Attack Vectors

A critical heap buffer overflow vulnerability was discovered and patched in the YAML parser embedded within an Android VPN application, where five unvalidated `memcpy` calls could allow an attacker to corrupt heap memory by supplying a crafted YAML configuration file. This class of vulnerability is particularly dangerous because it can lead to arbitrary code execution or application crashes in security-sensitive contexts. The fix adds proper bounds validation before each copy operation, eliminat

critical

Critical Buffer Overflow Fixed: When "Safe" Functions Aren't Safe

A critical vulnerability in DeepSkyStackerKernel's StackWalker.cpp was silently replacing bounds-checking string functions with their unsafe counterparts via preprocessor macros, exposing the entire codebase to buffer overflow attacks. This fix removes the dangerous macro definitions that discarded buffer size arguments, restoring the intended memory safety protections across all call sites. Understanding how this subtle macro trick works is essential for any C/C++ developer working with string