A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.
Workaround:
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2024-1485 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2264106 | third party advisory issue tracking |
https://github.com/advisories/GHSA-84xv-jfrm-h4gm | third party advisory |
https://github.com/devfile/registry-support/commit/0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d | patch |
https://github.com/devfile/registry-support/pull/197 | patch |