First published: Wed Feb 15 2023(Updated: )
A flaw was found in Go, where it could allow a remote attacker to traverse directories on the system, caused by improper validation of user requests by the filepath.Clean on Windows package. This flaw allows an attacker to send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-clients | <0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 | 0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 |
Golang Go | <1.19.6 | |
Golang Go | =1.20.0 | |
Microsoft Windows | ||
redhat/Go | <1.20.1 | 1.20.1 |
redhat/Go | <1.19.6 | 1.19.6 |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-41722.
The severity of CVE-2022-41722 is high with a CVSS score of 7.5.
The vulnerability allows a remote attacker to traverse directories on the system, potentially enabling a directory traversal attack.
The affected software versions include Go 1.19.6, Go 1.20.0, and openshift-clients 4.13.0-202305291355.p0.g1024efc.assembly.stream.el8.
To fix CVE-2022-41722, update to Go version 1.19.6 or 1.20.1, or update openshift-clients to version 4.13.0-202305291355.p0.g1024efc.assembly.stream.el8.