Skip to content

Openshift Enterprise source-to-image vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip)

Moderate severity GitHub Reviewed Published Feb 6, 2023 to the GitHub Advisory Database • Updated Oct 2, 2023

Package

gomod github.com/openshift/source-to-image (Go)

Affected versions

< 1.1.10-0.20180427153919-f5cbcbc5cc6f

Patched versions

1.1.10-0.20180427153919-f5cbcbc5cc6f

Description

Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.

Specific Go Packages Affected

github.com/openshift/source-to-image/pkg/tar

References

Published to the GitHub Advisory Database Feb 6, 2023
Reviewed Feb 6, 2023
Last updated Oct 2, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2018-1103

GHSA ID

GHSA-w55j-f7vx-6q37
Checking history
See something to contribute? Suggest improvements for this vulnerability.