Unauthenticated Remote Attackers Can Trigger Vulnerability in Decompression Function
CVE-2024-1485
9.3CRITICAL
Summary
A vulnerability has been identified in the decompression function of the registry-support component provided by Red Hat. This issue can be exploited by an unauthenticated remote attacker who successfully convinces a user to parse a devfile that utilizes the 'parent' or 'plugin' keywords. The exploitation of this flaw may result in the download of a malicious archive, which, during the cleanup process, could inadvertently lead to the overwriting or deletion of files that are outside the designated archive boundaries. This behavior poses a significant security risk, allowing unauthorized access to critical system files.
References
CVSS V3.1
Score:
9.3
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Joern Schneeweisz (GitLab Security Research Team) for reporting this issue.