Back to Blog
critical SEVERITY7 min read

Path Traversal in node-tar: How Hardlink Bypass Exposed Your Files

A medium-severity vulnerability (CVE-2026-24842) in node-tar allowed attackers to bypass hardlink security checks and create arbitrary files through path traversal attacks. This vulnerability, combined with improper configuration management storing JWT secrets in plaintext .env files, created a dangerous attack vector for token forgery and unauthorized access.

O
By orbisai0security
March 6, 2026
#security#node-tar#path-traversal#jwt#dotenv#cve#nodejs

Introduction

Archive extraction vulnerabilities are among the most insidious security issues in software development. They often fly under the radar until an attacker exploits them to gain unauthorized access to sensitive files or execute malicious code. The recently patched CVE-2026-24842 in node-tar demonstrates how a seemingly minor bypass in hardlink security checks can cascade into a major security incident—especially when combined with poor configuration management practices.

If your application uses node-tar for archive extraction and stores sensitive configuration data (like JWT secrets) in plaintext files, this vulnerability could have allowed attackers to compromise your entire authentication system.

The Vulnerability Explained

What is Path Traversal?

Path traversal (also known as directory traversal) is a web security vulnerability that allows attackers to access files and directories outside the intended directory structure. By manipulating file paths with special characters like ../ (dot-dot-slash), attackers can "traverse" up the directory tree to reach sensitive files.

The node-tar Hardlink Vulnerability

Node-tar is a popular npm package used to create and extract tar archives in Node.js applications. The library includes security checks to prevent malicious archives from exploiting path traversal vulnerabilities. However, CVE-2026-24842 revealed a critical flaw: the hardlink security check could be bypassed, allowing attackers to create arbitrary files anywhere on the filesystem.

Here's how the attack works:

  1. Crafting a Malicious Archive: An attacker creates a specially crafted tar archive containing hardlinks with path traversal sequences
  2. Bypassing Security Checks: The malicious archive exploits weaknesses in node-tar's hardlink validation logic
  3. Arbitrary File Creation: Upon extraction, the archive creates or overwrites files outside the intended extraction directory
  4. Accessing Sensitive Data: The attacker targets configuration files like .env that contain sensitive credentials

Real-World Attack Scenario

Consider a web application that:
- Allows users to upload and extract tar archives
- Uses dotenv (^16.4.5) to manage configuration
- Stores JWT secrets in a .env file at the application root

Attack Flow:

1. Attacker uploads malicious.tar containing:
   - A hardlink with path: ../../../../app/.env
   - Payload designed to read or exfiltrate the file

2. Application extracts the archive using vulnerable node-tar

3. Hardlink bypass allows file creation outside extraction directory

4. Attacker gains access to .env file contents:
   JWT_SECRET=super_secret_key_12345
   DATABASE_URL=postgresql://user:pass@localhost/db

5. Attacker forges valid JWT tokens for any user

6. Complete authentication bypass achieved

The Amplified Risk: Plaintext JWT Secrets

The vulnerability's impact is significantly amplified by a common misconfiguration: storing JWT secrets in plaintext .env files. While dotenv is a convenient configuration management tool, it creates several attack surfaces:

  • Directory Traversal: As demonstrated by this CVE
  • Exposed .git Folders: Accidentally deployed .git directories may contain .env files in history
  • Misconfigured Web Servers: Improper server configuration might serve .env files directly
  • Server Compromise: Any server-level breach exposes all secrets immediately

Once an attacker obtains the JWT secret, they can:
- Forge tokens for any user (including administrators)
- Bypass all authentication mechanisms
- Maintain persistent access even after password changes
- Impersonate users without detection

The Fix

What Changed?

The fix for CVE-2026-24842 strengthens the hardlink security validation in node-tar by:

  1. Enhanced Path Validation: Implementing stricter checks on hardlink target paths
  2. Canonical Path Resolution: Resolving all paths to their canonical form before validation
  3. Symlink and Hardlink Restrictions: Preventing links from pointing outside the extraction directory

Security Improvements

While the specific code changes weren't provided in the PR diff, a proper fix would implement logic similar to this:

Before (Vulnerable):

// Simplified vulnerable code example
function extractHardlink(entry, extractPath) {
  const targetPath = path.join(extractPath, entry.linkpath);
  const linkPath = path.join(extractPath, entry.path);

  // Insufficient validation
  fs.linkSync(targetPath, linkPath);
}

After (Secure):

// Simplified secure code example
function extractHardlink(entry, extractPath) {
  const targetPath = path.resolve(extractPath, entry.linkpath);
  const linkPath = path.resolve(extractPath, entry.path);
  const canonicalExtractPath = path.resolve(extractPath);

  // Strict validation: ensure both paths are within extraction directory
  if (!targetPath.startsWith(canonicalExtractPath + path.sep)) {
    throw new Error('Path traversal attempt detected in hardlink target');
  }

  if (!linkPath.startsWith(canonicalExtractPath + path.sep)) {
    throw new Error('Path traversal attempt detected in hardlink path');
  }

  // Additional check: verify target exists and is within bounds
  if (!fs.existsSync(targetPath)) {
    throw new Error('Hardlink target does not exist');
  }

  fs.linkSync(targetPath, linkPath);
}

Key Security Enhancements:

  1. Path Resolution: Using path.resolve() converts relative paths to absolute, canonical paths
  2. Boundary Checking: Verifying both target and link paths start with the extraction directory
  3. Existence Validation: Ensuring hardlink targets exist before creating links
  4. Fail-Safe Approach: Throwing errors rather than silently failing

Updating Your Dependencies

To apply this fix, update your package-lock.json:

# Update node-tar to the patched version
npm audit fix

# Or manually update
npm install tar@latest

# Verify the fix
npm audit

Prevention & Best Practices

1. Implement Defense in Depth for Configuration Management

Never rely solely on file system permissions to protect secrets:

// ❌ BAD: Plaintext secrets in .env
JWT_SECRET=my_secret_key

// ✅ GOOD: Use secret management services
// AWS Secrets Manager
const AWS = require('aws-sdk');
const secretsManager = new AWS.SecretsManager();

async function getJWTSecret() {
  const secret = await secretsManager.getSecretValue({
    SecretId: 'prod/jwt/secret'
  }).promise();

  return JSON.parse(secret.SecretString).JWT_SECRET;
}

// Or use encrypted environment variables
const { decrypt } = require('./encryption');
const JWT_SECRET = decrypt(process.env.ENCRYPTED_JWT_SECRET);

2. Validate Archive Contents Before Extraction

Always inspect tar archives before extraction:

const tar = require('tar');
const path = require('path');

async function safeExtract(archivePath, extractPath) {
  const entries = [];

  // First pass: validate all entries
  await tar.list({
    file: archivePath,
    onentry: (entry) => {
      const resolved = path.resolve(extractPath, entry.path);
      const canonical = path.resolve(extractPath);

      // Reject any entry trying to escape
      if (!resolved.startsWith(canonical + path.sep)) {
        throw new Error(`Dangerous path detected: ${entry.path}`);
      }

      // Reject suspicious patterns
      if (entry.path.includes('..')) {
        throw new Error(`Path traversal attempt: ${entry.path}`);
      }

      entries.push(entry);
    }
  });

  // Second pass: safe extraction
  await tar.extract({
    file: archivePath,
    cwd: extractPath,
    strict: true
  });
}

3. Apply the Principle of Least Privilege

Limit extraction permissions:

const fs = require('fs');
const tar = require('tar');

// Create isolated extraction directory with restricted permissions
const extractPath = '/tmp/safe-extraction-' + crypto.randomUUID();
fs.mkdirSync(extractPath, { mode: 0o700 }); // Owner read/write/execute only

try {
  await tar.extract({
    file: uploadedArchive,
    cwd: extractPath,
    strict: true
  });

  // Process files in isolation
  await processExtractedFiles(extractPath);
} finally {
  // Clean up
  fs.rmSync(extractPath, { recursive: true, force: true });
}

4. Implement Content Security Policies

Restrict what archives can contain:

const ALLOWED_EXTENSIONS = ['.txt', '.json', '.md', '.csv'];
const MAX_FILE_SIZE = 10 * 1024 * 1024; // 10MB
const MAX_TOTAL_SIZE = 100 * 1024 * 1024; // 100MB

function validateArchiveEntry(entry) {
  const ext = path.extname(entry.path).toLowerCase();

  if (!ALLOWED_EXTENSIONS.includes(ext)) {
    throw new Error(`Forbidden file type: ${ext}`);
  }

  if (entry.size > MAX_FILE_SIZE) {
    throw new Error(`File too large: ${entry.path}`);
  }

  // Additional checks...
}

5. Use Security Scanning Tools

Integrate automated security scanning into your CI/CD pipeline:

# npm audit for dependency vulnerabilities
npm audit --audit-level=moderate

# Snyk for comprehensive scanning
snyk test

# OWASP Dependency-Check
dependency-check --project MyApp --scan .

# GitHub Dependabot (automatic PR creation)
# Enable in repository settings

6. Follow OWASP Guidelines

This vulnerability maps to several OWASP categories:

7. Secure Configuration Management Checklist

  • [ ] Never commit .env files to version control
  • [ ] Add .env to .gitignore immediately
  • [ ] Use secret management services (AWS Secrets Manager, HashiCorp Vault, Azure Key Vault)
  • [ ] Rotate secrets regularly (at least quarterly)
  • [ ] Implement secret scanning in CI/CD (git-secrets, truffleHog)
  • [ ] Use different secrets for each environment
  • [ ] Encrypt secrets at rest and in transit
  • [ ] Audit secret access logs
  • [ ] Implement secret expiration policies
  • [ ] Use short-lived tokens when possible

Conclusion

CVE-2026-24842 serves as a powerful reminder that security vulnerabilities rarely exist in isolation. A path traversal bypass in node-tar's hardlink handling, combined with plaintext configuration management, created a perfect storm for authentication bypass and unauthorized access.

The key takeaways:

  1. Update Immediately: Patch node-tar to the latest version to eliminate the path traversal vulnerability
  2. Defense in Depth: Never rely on a single security control; implement multiple layers of protection
  3. Secure Configuration: Move away from plaintext .env files to proper secret management solutions
  4. Validate Everything: Always validate and sanitize file paths, especially when dealing with user-supplied archives
  5. Stay Informed: Regularly audit dependencies and monitor security advisories

Security is not a one-time fix but an ongoing practice. By understanding vulnerabilities like this one and implementing robust security practices, you can significantly reduce your application's attack surface and protect your users' data.

Remember: the best time to fix a security vulnerability was before it was discovered. The second-best time is now.

Stay secure, and happy coding!


For more information about this vulnerability, consult the National Vulnerability Database entry for CVE-2026-24842 and review the node-tar security advisories.

View the Security Fix

Check out the pull request that fixed this vulnerability

View PR #60

Related Articles

critical

Stack Buffer Overflow in MapScale: How Five Unsafe sprintf Calls Created a Critical Vulnerability

A critical stack-based buffer overflow vulnerability was discovered and patched in `src/mapscale.c`, where five unbounded `sprintf` calls wrote formatted output into fixed-size stack buffers without any bounds checking. An attacker controlling unit text strings could overflow the stack buffer, potentially overwriting the function return address and achieving arbitrary code execution. The fix replaces dangerous `sprintf` calls with their bounds-checked counterparts, eliminating the overflow risk

critical

Heap Buffer Overflows in YAML Parser: How Unchecked memcpy Calls Create Critical Attack Vectors

A critical heap buffer overflow vulnerability was discovered and patched in the YAML parser embedded within an Android VPN application, where five unvalidated `memcpy` calls could allow an attacker to corrupt heap memory by supplying a crafted YAML configuration file. This class of vulnerability is particularly dangerous because it can lead to arbitrary code execution or application crashes in security-sensitive contexts. The fix adds proper bounds validation before each copy operation, eliminat

critical

Critical Buffer Overflow Fixed: When "Safe" Functions Aren't Safe

A critical vulnerability in DeepSkyStackerKernel's StackWalker.cpp was silently replacing bounds-checking string functions with their unsafe counterparts via preprocessor macros, exposing the entire codebase to buffer overflow attacks. This fix removes the dangerous macro definitions that discarded buffer size arguments, restoring the intended memory safety protections across all call sites. Understanding how this subtle macro trick works is essential for any C/C++ developer working with string