Path Traversal Affecting golang.org/x/crypto/acme/autocert package, versions <0.24.0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GOLANGORGXCRYPTOACMEAUTOCERT-7416897
- published 3 Jul 2024
- disclosed 2 Jul 2024
- credit Juho Nurminen
Introduced: 2 Jul 2024
CVE-2022-30636 Open this link in a new tabHow to fix?
Upgrade golang.org/x/crypto/acme/autocert
to version 0.24.0 or higher.
Overview
golang.org/x/crypto/acme/autocert is a package providing automatic access to certificates from Let's Encrypt and any other ACME-based CA
Affected versions of this package are vulnerable to Path Traversal in the DirCache()
function, due to the use of path.Base
, which accepts relative paths, instead of filepath.Base
. An attacker can read HTTP-01 token files on the target filesystem system by passing in filenames with ..
.
Note: This vulnerability only exists on Windows, using Windows path separators (\
), on files with the suffix +http-01
.