The vulnerability described is a path traversal in the Tekton Pipelines git resolver. The advisory explicitly mentions that the vulnerability was introduced in commit 318006c4e3a5 and that the vulnerable function is getFileContent in pkg/resolution/resolver/git/repository.go.
Analysis of the introducing commit (318006c4e3a5) confirms the creation of the getFileContent function. This function takes a path string and uses it in os.ReadFile(filepath.Join(repo.directory, path)) without any sanitization, which is the root cause of the path traversal vulnerability.
Analysis of the fixing commit (961388fcf337) shows two key changes. First, the getFileContent function was significantly modified to resolve symlinks and perform containment checks to ensure the resolved path is within the repository's directory. Second, the PopulateDefaultParams function in pkg/resolution/resolver/git/resolver.go was updated to validate the pathInRepo parameter at an earlier stage, rejecting any input containing .. sequences.
Based on this evidence, (*repository).getFileContent is identified as the primary vulnerable function, as it is directly responsible for the unsafe file access. PopulateDefaultParams is also included as a related function that was modified to implement a security control (input validation) as part of the fix.