Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-41722

Опубликовано: 15 фев. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".

A flaw was found in Go, where it could allow a remote attacker to traverse directories on the system, caused by improper validation of user requests by the filepath.Clean on Windows package. This flaw allows an attacker to send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.

Отчет

This CVE is specific to versions of Go on Windows. It does not affect any packages shipped with Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 9. The following components were fixed in RHSA-2023:3366 and have therefore been marked as "Not Affected": openshift, cri-tools, cri-o, containernetworking-plugins and conmon

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-operator-rhel9Not affected
Cryostat 2cryostat-tech-preview/cryostat-rhel8-operatorUnder investigation
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Migration Toolkit for Applications 6mta/mta-hub-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-velero-plugin-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-rhel8-operatorNot affected
mirror registry for Red Hat OpenShiftmirror-registry-containerNot affected
Network Observability Operatornetwork-observability/network-observability-rhel9-operatorNot affected
Node HealthCheck Operatorworkload-availability/node-healthcheck-rhel8-operatorNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2203008golang: path/filepath: path-filepath filepath.Clean path traversal

EPSS

Процентиль: 39%
0.00175
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".

CVSS3: 7.5
nvd
почти 3 года назад

A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".

CVSS3: 7.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
почти 3 года назад

A path traversal vulnerability exists in filepath.Clean on Windows. On ...

CVSS3: 7.5
github
почти 3 года назад

A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".

EPSS

Процентиль: 39%
0.00175
Низкий

7.5 High

CVSS3