The existing URI path filters in OctoRPKI (version < 1.4.3) mitigating Path traversal vulnerability could be bypassed by an attacker. In case a malicious TAL file is parsed, it was possible to write files outside the base cache folder.
github.com/cloudflare/cfrpki/cmd/octorpki
The issue was fixed in version 1.4.3
{
"severity": "HIGH",
"github_reviewed": true,
"nvd_published_at": null,
"github_reviewed_at": "2022-06-25T07:12:08Z",
"cwe_ids": [
"CWE-22"
]
}