Path traversal on Windows in path/filepath
CVE-2022-41722

7.5HIGH

Key Information:

Vendor
CVE Published:
28 February 2023

What is CVE-2022-41722?

A path traversal vulnerability exists in the filepath.Clean function on Windows platforms. This function improperly validates paths, allowing potentially malicious input to be transformed into accessible absolute paths. Specifically, it can convert an invalid path such as 'a/../c:/b' into 'c:\b', facilitating unauthorized access to directories. Post-fix improvements ensure that invalid paths are not converted into absolute paths, hence mitigating the risk of such directory traversal attacks.

Affected Version(s)

path/filepath windows 0 < 1.19.6

path/filepath windows 1.20.0-0 < 1.20.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

RyotaK (https://ryotak.net)
.