Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
  • Sign in
  • G goSDN
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 42
    • Issues 42
    • List
    • Boards
    • Service Desk
    • Milestones
    • Iterations
  • Merge requests 13
    • Merge requests 13
  • Deployments
    • Deployments
    • Releases
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • danet
  • goSDN
  • Issues
  • #106
Closed
Open
Created Apr 14, 2021 by Manuel Kieweg@fbi1478🤷Contributor

Investigate vulnerability: Potential file inclusion via variable

Issue created from vulnerability 855

Description:

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

  • Severity: medium
  • Confidence: high
  • Location: nucleus/util/proto/message.go:31

Identifiers:

  • Gosec Rule ID G304
  • CWE-22

Scanner:

  • Name: Gosec
Assignee
Assign to
Time tracking