First published: Tue Aug 09 2022(Updated: )
Golang Go could allow a local attacker to bypass security restrictions, caused by a flaw in the filepath.Clean function. By sending a specially-crafted request, an attacker could exploit this vulnerability to convert an invalid path to a valid, absolute path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.17.11 | |
Golang Go | >=1.18.0<1.18.3 | |
Microsoft Windows | ||
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29804 is a vulnerability that allows potential directory traversal attack by converting certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows.
CVE-2022-29804 has a severity value of 7.5 (High).
CVE-2022-29804 affects Go 1.17.11 and Go 1.18.0 to 1.18.3 on Windows.
To fix CVE-2022-29804, update to Go 1.17.11 or Go 1.18.3 or later.
No, Microsoft Windows is not vulnerable to CVE-2022-29804.