github.com/golang/go is vulnerable to path traversal. The vulnerability exists because the JoinPath
function of url.go
does not properly remove the relative elements from the start of the path when the first path element is “”, allowing an attacker to access files outside the expected directory through the urls such as https://go.dev", "../go
github.com/advisories/GHSA-q856-gh5w-3vwg
github.com/golang/go/commit/28335508913a46e05ef0c04a18e8a1a6beb775ec
github.com/golang/go/issues/54385
github.com/golang/go/pull/54390
go.dev/cl/423514
go.dev/issue/54385
groups.google.com/g/golang-announce/c/x49AQzIVX-s
lists.fedoraproject.org/archives/list/[email protected]/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF/
pkg.go.dev/vuln/GO-2022-0988
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.16/community.yaml
security.gentoo.org/glsa/202209-26