CVE-2022-41722
ADVISORY - nistSummary
A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".
Common Weakness Enumeration (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GoLang
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
stdlib | golang | - | - | <1.19.6 | 1.19.6 |
stdlib | golang | - | - | >=1.20.0-0,<1.20.1 | 1.20.1 |
Severity and metrics
No CVSS data available from this advisory.
NIST
3.9
CVSS SCORE
7.5highAlpine
-
Debian
-
CVSS SCORE
N/AlowUbuntu
3.9
CVSS SCORE
7.5mediumAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighBitnami
BIT-2022-41722
-
CVSS SCORE
N/AhighBitnami
BIT-golang-2022-41722
3.9
CVSS SCORE
7.5highRed Hat
3.9
CVSS SCORE
7.5mediumChainguard
CGA-f3qc-96rj-fjgq
-
Chainguard
CGA-g8m9-c378-739x
-
Chainguard
CGA-h65w-x6jc-73gv
-
Photon
CVE-2022-41722
-