Same issue as #3991 in tar
.
This could also be used to gain command execution on the host, or elevate privileges to the anon
user from a lower privileged user, in the event that anon
extracts a malicious tar file.
Command execution via /etc/shellrc
(as root
) or /home/anon/.config/Terminal.ini
(as anon
).
Pay now to fund the work behind this issue.
Get updates on progress being made.
Maintainer is rewarded once the issue is completed.
You're funding impactful open source efforts
You want to contribute to this effort
You want to get funding like this too