CVE-2022-30636

July 2, 2024, 8:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Go programming language

Source

security@golang.org

Tags

CVE-2022-30636 details

Published : July 2, 2024, 8:15 p.m.
Last Modified : July 2, 2024, 8:15 p.m.

Description

httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\..\asd becomes ..\..\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix.

CVSS Score

1 2 3 4 5 6 7 8 9 10

Weakness

Weakness Name Description

References

URL Source
https://go.dev/cl/408694 security@golang.org
https://go.dev/issue/53082 security@golang.org
https://pkg.go.dev/vuln/GO-2024-2961 security@golang.org
This website uses the NVD API, but is not approved or certified by it.