CVE-2024-8244
BaseFortify
Publication date: 2025-08-06
Last updated on: 2025-11-03
Assigner: Go Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| golang | go | 1.20 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the filepath.Walk and filepath.WalkDir functions, which are supposed to not follow symbolic links. However, they are vulnerable to a TOCTOU (time of check/time of use) race condition where part of the path being processed can be replaced with a symbolic link during the walk operation, potentially causing unexpected behavior.
How can this vulnerability impact me? :
The vulnerability can lead to unexpected traversal of symbolic links during file path walking, which might allow an attacker to manipulate the file paths being accessed. This could result in unauthorized access to files or directories, potentially leading to security breaches or data exposure.