We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR's unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.
Reserved 2025-06-10 | Published 2025-06-18 | Updated 2025-06-18 | Assigner GoogleCWE-427 Uncontrolled Search Path Element
Anthony Weems of Google's Cloud Vulnerability Research team
Simon Scannell of Google's Cloud Vulnerability Research team
Stefan Schiller of Google's Cloud Vulnerability Research team
github.com/google/osv-scalibr/releases/tag/v0.1.8
github.com/...ommit/2444419b1818c2d6917fc3394c947fb3276e9d59
Support options