Unauthenticated Remote Attackers Can Trigger Vulnerability in Decompression Function
CVE-2024-1485

9.3CRITICAL

Key Information:

Summary

A vulnerability has been identified in the decompression function of the registry-support component provided by Red Hat. This issue can be exploited by an unauthenticated remote attacker who successfully convinces a user to parse a devfile that utilizes the 'parent' or 'plugin' keywords. The exploitation of this flaw may result in the download of a malicious archive, which, during the cleanup process, could inadvertently lead to the overwriting or deletion of files that are outside the designated archive boundaries. This behavior poses a significant security risk, allowing unauthorized access to critical system files.

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Joern Schneeweisz (GitLab Security Research Team) for reporting this issue.
.