Логотип exploitDog
bind:"CVE-2023-45283"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-45283"

Количество 12

Количество 12

ubuntu логотип

CVE-2023-45283

почти 2 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45283

почти 2 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-45283

около 2 месяцев назад

Insecure parsing of Windows paths with a \??\ prefix in path/filepath

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45283

почти 2 года назад

The filepath package does not recognize paths with a \??\ prefix as sp ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-vvjp-q62m-2vph

почти 2 года назад

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-09013

почти 2 года назад

Уязвимость пакета filepath языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4471-1

почти 2 года назад

Security update for go1.21

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4470-1

почти 2 года назад

Security update for go1.20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4472-1

почти 2 года назад

Security update for go1.20-openssl

EPSS: Низкий
redos логотип

ROS-20240826-01

около 1 года назад

Множественные уязвимости packer

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240402-17

больше 1 года назад

Множественные уязвимости golang

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4469-1

почти 2 года назад

Security update for go1.21-openssl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?...

CVSS3: 7.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:

CVSS3: 7.5
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2023-45283

Insecure parsing of Windows paths with a \??\ prefix in path/filepath

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2023-45283

The filepath package does not recognize paths with a \??\ prefix as sp ...

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-vvjp-q62m-2vph

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-09013

Уязвимость пакета filepath языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4471-1

Security update for go1.21

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4470-1

Security update for go1.20

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4472-1

Security update for go1.20-openssl

почти 2 года назад
redos логотип
ROS-20240826-01

Множественные уязвимости packer

CVSS3: 7.5
около 1 года назад
redos логотип
ROS-20240402-17

Множественные уязвимости golang

CVSS3: 7.5
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4469-1

Security update for go1.21-openssl

почти 2 года назад

Уязвимостей на страницу