We got this "HIGH security problem" reported for earlier today:

"The -o / --output parameter in cURL does not restrict or sanitize file paths. When passed relative traversal sequences (e.g., ../../), cURL writes files outside the current working directory, allowing arbitrary file overwrite. In automated or privileged environments (CI/CD, root containers), this leads to Remote Code Execution (RCE), privilege escalation, and supply chain risk."

Never a dull moment.

0

If you have a fediverse account, you can quote this note from your own instance. Search https://mastodon.social/users/bagder/statuses/114434619207599663 on your instance and quote it. (Note that quoting is not supported in Mastodon.)