7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
41.3%
golang is vulnerable to Path Traversal. The vulnerability is due to a lack of file path validation in path_windows.go
. This can allows an attacker to access arbitrary locations on a Windows system.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | le | go1.21.3 | |
github.com/golang/go | le | go1.20.10 | |
github.com/golang/go | le | go1.21.3 | |
github.com/golang/go | le | go1.20.10 |
www.openwall.com/lists/oss-security/2023/12/05/2
github.com/golang/go/commit/9e933c189ca3a84f12995b3c799364a06abc4376
github.com/golang/go/issues/63713
go.dev/cl/540277
go.dev/cl/541175
go.dev/issue/63713
go.dev/issue/64028
groups.google.com/g/golang-announce/c/4tU8LZfBFkY
groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
pkg.go.dev/vuln/GO-2023-2185
security.netapp.com/advisory/ntap-20231214-0008/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
41.3%