stereoscope vulnerable to tar path traversal when processing OCI tar archives
Moderate severity
GitHub Reviewed
Published
Jan 31, 2024
in
anchore/stereoscope
•
Updated Feb 2, 2024
Package
Affected versions
< 0.0.1
Patched versions
0.0.1
Description
Published by the National Vulnerability Database
Jan 31, 2024
Published to the GitHub Advisory Database
Jan 31, 2024
Reviewed
Jan 31, 2024
Last updated
Feb 2, 2024
Impact
It is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of
github.com/anchore/stereoscope/pkg/file.UntarToDirectory()
function, thegithub.heygears.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider
struct, or the higher levelgithub.heygears.com/anchore/stereoscope/pkg/image.Image.Read()
function express this vulnerability.Patches
Patched in v0.0.1
Workarounds
If you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.
References
References