vulnerability
Red Hat OpenShift: CVE-2022-32190: golang: net/url: JoinPath does not strip relative path components in all circumstances
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Sep 13, 2022 | Jan 26, 2023 | Apr 11, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Sep 13, 2022
Added
Jan 26, 2023
Modified
Apr 11, 2025
Description
JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result.
Solution(s)
linuxrpm-upgrade-atomic-openshift-service-idlerlinuxrpm-upgrade-buildahlinuxrpm-upgrade-containers-commonlinuxrpm-upgrade-kernellinuxrpm-upgrade-kernel-rtlinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-openshift-kuryrlinuxrpm-upgrade-ovn22-12linuxrpm-upgrade-podmanlinuxrpm-upgrade-runclinuxrpm-upgrade-skopeo
References
- CVE-2022-32190
- https://attackerkb.com/topics/CVE-2022-32190
- REDHAT-RHSA-2022:7398
- REDHAT-RHSA-2022:7399
- REDHAT-RHSA-2022:8634
- REDHAT-RHSA-2023:0264
- REDHAT-RHSA-2023:0584
- REDHAT-RHSA-2023:0693
- REDHAT-RHSA-2023:3204
- REDHAT-RHSA-2023:3205
- REDHAT-RHSA-2023:3613
- REDHAT-RHSA-2023:3642
- REDHAT-RHSA-2023:3742
- REDHAT-RHSA-2024:0485

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.