Article Details
Scrape Timestamp (UTC): 2025-10-22 17:23:17.135
Original Article Text
Click to Toggle View
TARmageddon flaw in abandoned Rust library enables RCE attacks. A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code execution on systems running unpatched software. Tracked as CVE-2025-62518, this logic flaw results from a desynchronization issue that allows unauthenticated attackers to inject additional archive entries during TAR file extraction. This occurs specifically when processing nested TAR files with mismatched ustar and PAX extended headers, causing the parser to jump into the file content and mistake it for tar headers, leading to the extraction of attacker-supplied files. Edera, the cybersecurity company that discovered the vulnerability and dubbed it TARmageddon, explains that threat actors can exploit it to overwrite files in supply chain attacks by replacing configuration files and hijacking build backends. This security flaw affects not only projects using async-tar but also tokio-tar, an extremely popular fork with over 7 million downloads on crates.io that has also been abandoned. While the active forks have already been patched, Edera says it's not possible to accurately estimate the impact of this vulnerability due to the widespread nature of its forks, including tokio-tar. "Due to the widespread nature of tokio-tar in various forms, it is not possible to truly quantify upfront the blast radius of this bug across the ecosystem," said Edera. "While the active forks have been successfully patched (see also Astral Security Advisory), this disclosure highlights a major systemic challenge: the highly downloaded tokio-tar remains unpatched." The TARmageddon vulnerability affects many widely used projects, including Binstalk, Astral's uv Python package manager, the wasmCloud universal application platform, liboxen, and the open-source testcontainers library. While some of the downstream projects Edera contacted have announced plans to remove the vulnerable dependency or switch to a patched fork, others have not responded, and more projects that haven't been notified are likely also using it. Edera advises developers to either upgrade to a patched version or immediately remove the vulnerable tokio-tar dependency. They should switch to the actively maintained astral-tokio-tar fork if their projects depend on the vulnerable tokio-tar library. Edera's async-tar fork (krata-tokio-tar) will be archived to reduce confusion in the ecosystem. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
A critical vulnerability, CVE-2025-62518, in the abandoned async-tar Rust library allows remote code execution via desynchronized TAR file extraction.
The flaw affects both async-tar and its popular fork, tokio-tar, which has over 7 million downloads, posing a significant risk to numerous projects.
The vulnerability enables attackers to inject malicious files during TAR extraction, potentially leading to supply chain attacks by overwriting configuration files.
Despite patches for active forks, the widespread use of unpatched tokio-tar complicates impact assessment, leaving many projects vulnerable.
Affected projects include Binstalk, wasmCloud, liboxen, and the open-source testcontainers library, with some developers planning to remove or replace the vulnerable dependency.
Edera advises developers to upgrade to a patched version or switch to the actively maintained astral-tokio-tar fork to mitigate risks.
The challenge highlights systemic issues in maintaining security for widely used but abandoned software dependencies.