A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".
No PoCs from references.
- https://github.com/8-cm/kube-dump
- https://github.com/drewtwitchell/scancompare
- https://github.com/h4ckm1n-dev/report-test
- https://github.com/runwhen-contrib/helm-charts