Directory Traversal Affecting go-ipfs package, versions <0.8.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE315-GOIPFS-1927728
  • published2 Aug 2021
  • disclosed24 Mar 2021

Introduced: 24 Mar 2021

CVE-2020-26279  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Alpine:3.15 go-ipfs to version 0.8.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream go-ipfs package and not the go-ipfs package as distributed by Alpine. See How to fix? for Alpine:3.15 relevant fixed versions and status.

go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG. This is fixed in version 0.8.0-rc1.

CVSS Scores

version 3.1