{"id":"CVE-2024-1485","details":"A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.","aliases":["GHSA-84xv-jfrm-h4gm","GO-2024-2576"],"modified":"2026-03-20T12:34:11.995161Z","published":"2024-02-14T00:15:46.783Z","related":["GHSA-84xv-jfrm-h4gm"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-1485"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-84xv-jfrm-h4gm"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2264106"},{"type":"FIX","url":"https://github.com/devfile/registry-support/commit/0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d"},{"type":"FIX","url":"https://github.com/devfile/registry-support/pull/197"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/devfile/registry-support","events":[{"introduced":"0"},{"fixed":"0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d"}]},{"type":"GIT","repo":"https://github.com/devfile/registry-support","events":[{"introduced":"0"},{"fixed":"0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d"}]}],"versions":["v1.0.0","v1.0.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"0.0.0-20240206"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1485.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H"}]}