golang is vulnerable to Path Traversal. The vulnerability is due to a lack of file path validation in path_windows.go
. This can allows an attacker to access arbitrary locations on a Windows system.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | le | go1.21.3 | |
github.com/golang/go | le | go1.20.10 | |
github.com/golang/go | le | go1.21.3 | |
github.com/golang/go | le | go1.20.10 |
www.openwall.com/lists/oss-security/2023/12/05/2
github.com/golang/go/commit/9e933c189ca3a84f12995b3c799364a06abc4376
github.com/golang/go/issues/63713
go.dev/cl/540277
go.dev/cl/541175
go.dev/issue/63713
go.dev/issue/64028
groups.google.com/g/golang-announce/c/4tU8LZfBFkY
groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
pkg.go.dev/vuln/GO-2023-2185
security.netapp.com/advisory/ntap-20231214-0008/