Vulnerability Report: GO-2023-1568
- CVE-2022-41722
- Affects: path/filepath
- Published: Feb 16, 2023
- Modified: May 20, 2024
A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".
Affected Packages
-
PathVersionsSymbols
-
before go1.19.6, from go1.20.0-0 before go1.20.1
Aliases
References
- https://go.dev/issue/57274
- https://go.dev/cl/468123
- https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
- https://vuln.go.dev/ID/GO-2023-1568.json
Credits
- RyotaK (https://ryotak.net)
Feedback
See anything missing or incorrect?
Suggest an edit to this report.