In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory.
No patch release has been made
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-22"
],
"severity": "LOW",
"github_reviewed_at": "2022-02-14T22:52:15Z",
"github_reviewed": true
}