-
Notifications
You must be signed in to change notification settings - Fork 61
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2023-45283 Updates #2185 Change-Id: Idc0d3d7b0a969f61721288011fa40c7de679cf4e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/540717 Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
- Loading branch information
Showing
3 changed files
with
303 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,150 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.0", | ||
"cveMetadata": { | ||
"cveId": "CVE-2023-45283" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" | ||
}, | ||
"title": "Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "Go standard library", | ||
"product": "path/filepath", | ||
"collectionURL": "https://pkg.go.dev", | ||
"packageName": "path/filepath", | ||
"versions": [ | ||
{ | ||
"version": "0", | ||
"lessThan": "1.20.11", | ||
"status": "affected", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"version": "1.21.0-0", | ||
"lessThan": "1.21.4", | ||
"status": "affected", | ||
"versionType": "semver" | ||
} | ||
], | ||
"platforms": [ | ||
"windows" | ||
], | ||
"programRoutines": [ | ||
{ | ||
"name": "Clean" | ||
}, | ||
{ | ||
"name": "volumeNameLen" | ||
}, | ||
{ | ||
"name": "join" | ||
}, | ||
{ | ||
"name": "Abs" | ||
}, | ||
{ | ||
"name": "Base" | ||
}, | ||
{ | ||
"name": "Dir" | ||
}, | ||
{ | ||
"name": "EvalSymlinks" | ||
}, | ||
{ | ||
"name": "Glob" | ||
}, | ||
{ | ||
"name": "IsLocal" | ||
}, | ||
{ | ||
"name": "Join" | ||
}, | ||
{ | ||
"name": "Rel" | ||
}, | ||
{ | ||
"name": "Split" | ||
}, | ||
{ | ||
"name": "VolumeName" | ||
}, | ||
{ | ||
"name": "Walk" | ||
}, | ||
{ | ||
"name": "WalkDir" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
}, | ||
{ | ||
"vendor": "Go standard library", | ||
"product": "internal/safefilepath", | ||
"collectionURL": "https://pkg.go.dev", | ||
"packageName": "internal/safefilepath", | ||
"versions": [ | ||
{ | ||
"version": "0", | ||
"lessThan": "1.20.11", | ||
"status": "affected", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"version": "1.21.0-0", | ||
"lessThan": "1.21.4", | ||
"status": "affected", | ||
"versionType": "semver" | ||
} | ||
], | ||
"platforms": [ | ||
"windows" | ||
], | ||
"programRoutines": [ | ||
{ | ||
"name": "fromFS" | ||
}, | ||
{ | ||
"name": "FromFS" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"description": "CWE-41: Improper Resolution of Path Equivalence" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://go.dev/issue/63713" | ||
}, | ||
{ | ||
"url": "https://go.dev/cl/540277" | ||
}, | ||
{ | ||
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY" | ||
}, | ||
{ | ||
"url": "https://pkg.go.dev/vuln/GO-2023-2185" | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,92 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2023-2185", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2023-45283" | ||
], | ||
"summary": "Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath", | ||
"details": "The filepath package does not recognize paths with a \\??\\ prefix as special.\n\nOn Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x.\n\nBefore fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b.\n\nSimilarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b.\n\nIn addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "stdlib", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.20.11" | ||
}, | ||
{ | ||
"introduced": "1.21.0-0" | ||
}, | ||
{ | ||
"fixed": "1.21.4" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "path/filepath", | ||
"goos": [ | ||
"windows" | ||
], | ||
"symbols": [ | ||
"Abs", | ||
"Base", | ||
"Clean", | ||
"Dir", | ||
"EvalSymlinks", | ||
"Glob", | ||
"IsLocal", | ||
"Join", | ||
"Rel", | ||
"Split", | ||
"VolumeName", | ||
"Walk", | ||
"WalkDir", | ||
"join", | ||
"volumeNameLen" | ||
] | ||
}, | ||
{ | ||
"path": "internal/safefilepath", | ||
"goos": [ | ||
"windows" | ||
], | ||
"symbols": [ | ||
"FromFS", | ||
"fromFS" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "REPORT", | ||
"url": "https://go.dev/issue/63713" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://go.dev/cl/540277" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-2185" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,61 @@ | ||
id: GO-2023-2185 | ||
modules: | ||
- module: std | ||
versions: | ||
- fixed: 1.20.11 | ||
- introduced: 1.21.0-0 | ||
fixed: 1.21.4 | ||
vulnerable_at: 1.21.3 | ||
packages: | ||
- package: path/filepath | ||
goos: | ||
- windows | ||
symbols: | ||
- Clean | ||
- volumeNameLen | ||
- join | ||
derived_symbols: | ||
- Abs | ||
- Base | ||
- Dir | ||
- EvalSymlinks | ||
- Glob | ||
- IsLocal | ||
- Join | ||
- Rel | ||
- Split | ||
- VolumeName | ||
- Walk | ||
- WalkDir | ||
- package: internal/safefilepath | ||
goos: | ||
- windows | ||
symbols: | ||
- fromFS | ||
derived_symbols: | ||
- FromFS | ||
summary: Insecure parsing of Windows paths with a \??\ prefix in path/filepath | ||
description: |- | ||
The filepath package does not recognize paths with a \??\ prefix as special. | ||
On Windows, a path beginning with \??\ is a Root Local Device path equivalent to | ||
a path beginning with \\?\. Paths with a \??\ prefix may be used to access | ||
arbitrary locations on the system. For example, the path \??\c:\x is equivalent | ||
to the more common path c:\x. | ||
Before fix, Clean could convert a rooted path such as \a\..\??\b into the root | ||
local device path \??\b. Clean will now convert this to .\??\b. | ||
Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path | ||
elements into the root local device path \??\b. Join will now convert this to | ||
\.\??\b. | ||
In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as | ||
absolute, and VolumeName correctly reports the \??\ prefix as a volume name. | ||
references: | ||
- report: https://go.dev/issue/63713 | ||
- fix: https://go.dev/cl/540277 | ||
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY | ||
cve_metadata: | ||
id: CVE-2023-45283 | ||
cwe: 'CWE-41: Improper Resolution of Path Equivalence' |