GMS-2022-7664: Relative Path Traversal
Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed. This is due to a path traversal vulnerability when extracting the .tar.gz
file of the package being scanned, which exists by design in the tarfile.TarFile.extractall
function.
References
Detect and mitigate GMS-2022-7664 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →