7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
29.2%
github.com/golang/go is vulnerable to path traversal. The vulnerability exists because the library does not properly escape file paths from the os.DirFS
function and http.Dir
type on windows, allowing an attacker to access any path on the system via a maliciously crafted path.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | le | go1.18.8 | |
github.com/golang/go | le | go1.19.3 | |
github.com/golang/go | le | go1.18.8 | |
github.com/golang/go | le | go1.19.3 |
github.com/advisories/GHSA-cvf9-g74c-vv79
github.com/golang/go/commit/7013a4f5f816af62033ad63dd06b77c30d7a62a7
github.com/golang/go/commit/d80340177116c079fb2ad681dd4aaa4bdc27b770
github.com/golang/go/issues/56694
go-review.googlesource.com/c/go/+/455716
go.dev/cl/455716
go.dev/issue/56694
groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ
pkg.go.dev/vuln/GO-2022-1143
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
29.2%