Lucene search

K
cveGoCVE-2022-30636
HistoryJul 02, 2024 - 8:15 p.m.

CVE-2022-30636

2024-07-0220:15:05
Go
web.nvd.nist.gov
34
httptokencachekey
windows
path.base
filepath.base
dircache
vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

15.8%

httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/…..\asd becomes …..\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix.

CNA Affected

[
  {
    "vendor": "golang.org/x/crypto",
    "product": "golang.org/x/crypto/acme/autocert",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "golang.org/x/crypto/acme/autocert",
    "versions": [
      {
        "version": "0",
        "lessThan": "0.0.0-20220525230936-793ad666bf5e",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "platforms": [
      "windows"
    ],
    "programRoutines": [
      {
        "name": "DirCache.Get"
      },
      {
        "name": "DirCache.Put"
      },
      {
        "name": "DirCache.Delete"
      },
      {
        "name": "HostWhitelist"
      },
      {
        "name": "Manager.GetCertificate"
      },
      {
        "name": "Manager.Listener"
      },
      {
        "name": "NewListener"
      },
      {
        "name": "listener.Accept"
      },
      {
        "name": "listener.Close"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

15.8%