Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR's unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.