Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
https://github.com/pear/Archive_Tar/issues/33
https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html
https://www.drupal.org/sa-core-2020-013
https://www.debian.org/security/2020/dsa-4817
http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html
Source: MITRE
Published: 2020-11-19
Updated: 2022-01-06
Type: CWE-74
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH