CVE-2024-1485

A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:devfile:registry-support:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-14 00:15

Updated : 2024-11-21 08:50


NVD link : CVE-2024-1485

Mitre link : CVE-2024-1485

CVE.ORG link : CVE-2024-1485


JSON object : View

Products Affected

redhat

  • openshift_developer_tools_and_services
  • openshift

devfile

  • registry-support
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')