Vulnerability Report: GO-2023-1568
- CVE-2022-41722
 - Affects: path/filepath
 - Published: Feb 16, 2023
 - Modified: May 20, 2024
 
A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".
Affected Packages
- 
      PathVersionsSymbols
 - 
      
      before go1.19.6, from go1.20.0-0 before go1.20.1
 
Aliases
References
- https://go.dev/issue/57274
 - https://go.dev/cl/468123
 - https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
 - https://vuln.go.dev/ID/GO-2023-1568.json
 
Credits
- RyotaK (https://ryotak.net)
 
Feedback
    See anything missing or incorrect?
    
      Suggest an edit to this report.