Impact
A malicious Zarf package can embed path traversal sequences in its Metadata.Name field, allowing the inspect subcommands to construct file paths that escape the intended output directory. The vulnerability enables an attacker to write arbitrary files with the permissions of the user executing the inspect command, potentially replacing or creating system configuration files such as cron jobs or SSH keys. This flaw, classified as CWE-22, results in uncontrolled file write, with confidentiality, integrity, and availability risks arising from the ability to modify critical system files.
Affected Systems
The issue affects Zarf version 0.23.0 through 0.74.1, inclusive. All deployments of the Zarf Airgap Native Packager Manager utilizing the package inspect sbom or documentation subcommands are susceptible when processing untrusted packages. The vulnerability persists until the release of version 0.74.2, which contains the fix.
Risk and Exploitability
The CVSS score of 7.1 reflects a moderate to high severity. Because exploitation requires the attacker to have local access to a machine running the inspect command, the EPSS score is noted as not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can influence the system by executing a crafted package during inspection, which only requires user-level privileges. The risk is significant for environments where unsanitized packages are inspected or where the inspection process runs under privileged accounts.
OpenCVE Enrichment
Github GHSA