Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45283
HistoryNov 09, 2023 - 12:00 a.m.

CVE-2023-45283

2023-11-0900:00:00
ubuntu.com
ubuntu.com
36
filepath package
go language
windows
arbitrary locations
system access
vulnerability
fixed
go 1.20.11
go 1.21.4
restore
impact
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%

The filepath package does not recognize paths with a ??\ prefix as
special. On Windows, a path beginning with ??\ is a Root Local Device path
equivalent to a path beginning with \?. Paths with a ??\ prefix may be
used to access arbitrary locations on the system. For example, the path
??\c:\x is equivalent to the more common path c:\x. Before fix, Clean
could convert a rooted path such as \a..??\b into the root local device
path ??\b. Clean will now convert this to .??\b. Similarly, Join(, ??,
b) could convert a seemingly innocent sequence of path elements into the
root local device path ??\b. Join will now convert this to .??\b. In
addition, with fix, IsAbs now correctly reports paths beginning with ??
as absolute, and VolumeName correctly reports the ??\ prefix as a volume
name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition
of the volume name in Windows paths starting with ?, resulting in
filepath.Clean(?\c:) returning ?\c: rather than ?\c:\ (among other
effects). The previous behavior has been restored.

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays.
rodrigo-zaiden may impact only Windows paths, a better triage of real impact, if any, is appreciated. closed related to CVE-2023-45284

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%