Логотип exploitDog
bind:CVE-2026-20613
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-20613

Количество 2

Количество 2

nvd логотип

CVE-2026-20613

17 дней назад

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-cq3j-qj2h-6rv3

17 дней назад

Container and Containerization archive extraction does not guard against escapes from extraction base directory.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-20613

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.

CVSS3: 7.8
0%
Низкий
17 дней назад
github логотип
GHSA-cq3j-qj2h-6rv3

Container and Containerization archive extraction does not guard against escapes from extraction base directory.

0%
Низкий
17 дней назад

Уязвимостей на страницу