github.com/golang/go is vulnerable to path traversal. The vulnerability exists because the library does not properly escape file paths from the os.DirFS
function and http.Dir
type on windows, allowing an attacker to access any path on the system via a maliciously crafted path.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | le | go1.18.8 | |
github.com/golang/go | le | go1.19.3 | |
github.com/golang/go | le | go1.18.8 | |
github.com/golang/go | le | go1.19.3 |
github.com/advisories/GHSA-cvf9-g74c-vv79
github.com/golang/go/commit/7013a4f5f816af62033ad63dd06b77c30d7a62a7
github.com/golang/go/commit/d80340177116c079fb2ad681dd4aaa4bdc27b770
github.com/golang/go/issues/56694
go-review.googlesource.com/c/go/+/455716
go.dev/cl/455716
go.dev/issue/56694
groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ
pkg.go.dev/vuln/GO-2022-1143