GMS-2022-71: Path traversal in github.com/cloudflare/cfrpki/cmd/octorpki
(updated )
In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory.
References
Detect and mitigate GMS-2022-71 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →