7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.1%
path/filepath of github.com/golang/go is vulnerable to Path Traversal. The vulnerability exists because the Clean
function of path.go
does not properly remove the .
prefix when the file path contains :
, allowing an attacker to access files outside the expected directory on windows.
bugzilla.suse.com/show_bug.cgi?id=1200137
github.com/golang/go/commit/5a89bb334d1280b0219108a8ee63c14dd04aa8fd
github.com/golang/go/issues/52476
github.com/golang/go/issues/52479
go-review.googlesource.com/c/go/+/401595/
go.dev/cl/401595
go.dev/issue/52476
go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290
groups.google.com/g/golang-announce
groups.google.com/g/golang-announce/c/TzIC9-t8Ytg
groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
pkg.go.dev/vuln/GO-2022-0533
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.1%