First published: Wed Dec 07 2022(Updated: )
Golang Go could allow a remote attacker to obtain sensitive information, caused byimproper access control by the os.DirFS function and http.Dir type. By sending a specially-crafted request, an attacker could exploit this vulnerability to access any path on the system, and use this information to launch further attacks against the affected system.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.18.9 | |
Golang Go | >=1.19.0<1.19.4 | |
Microsoft Windows | ||
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-41720.
The severity of CVE-2022-41720 is high with a CVSS score of 7.5.
CVE-2022-41720 impacts Golang Go versions 1.18.9 up to, but excluding, 1.19.4.
CVE-2022-41720 does not directly impact Microsoft Windows.
To mitigate CVE-2022-41720, it is recommended to upgrade Golang Go to a version above 1.19.4.