Description
Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0808 | Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command. |
Github GHSA |
GHSA-w55j-f7vx-6q37 | Openshift Enterprise source-to-image vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:48.543Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1103
No data.
Status : Modified
Published: 2018-06-12T15:29:00.257
Modified: 2024-11-21T03:59:11.287
Link: CVE-2018-1103
OpenCVE Enrichment
No data.
EUVD
Github GHSA