CVE-2022-30636 Affecting golang-go.crypto package, versions <1:0.0~git20220829.c86fa9a-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-GOLANGGOCRYPTO-7430228
  • published8 Jul 2024
  • disclosed2 Jul 2024

Introduced: 2 Jul 2024

CVE-2022-30636  (opens in a new tab)

How to fix?

Upgrade Debian:unstable golang-go.crypto to version 1:0.0~git20220829.c86fa9a-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-go.crypto package and not the golang-go.crypto package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/....\asd becomes ....\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix.