First published: Tue Sep 06 2022(Updated: )
JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | =1.19.0 | |
Golang Go | =1.19.0-beta1 | |
Golang Go | =1.19.0-rc1 | |
Golang Go | =1.19.0-rc2 | |
redhat/openshift-clients | <0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 | 0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 |
redhat/podman | <3:4.2.0-7.rhaos4.12.el9 | 3:4.2.0-7.rhaos4.12.el9 |
redhat/runc | <3:1.1.6-4.rhaos4.12.el8 | 3:1.1.6-4.rhaos4.12.el8 |
redhat/kubevirt | <0:4.13.0-1469.el7 | 0:4.13.0-1469.el7 |
redhat/kubevirt | <0:4.13.0-1469.el8 | 0:4.13.0-1469.el8 |
redhat/kubevirt | <0:4.13.0-1469.el9 | 0:4.13.0-1469.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-32190.
The severity of CVE-2022-32190 is high.
JoinPath and URL.JoinPath in the golang package do not remove ../ path elements from the result.
Yes, there are known remedies for this vulnerability.
You can find more information about CVE-2022-32190 on the CVE website, NVD, GitHub Go issue, Google Groups announcement, Red Hat Bugzilla, and Red Hat Access website.