{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2019-25073", "ASSIGNER": "security@golang.org", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory('Path Traversal')" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "github.com/goadesign/goa", "product": { "product_data": [ { "product_name": "github.com/goadesign/goa", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", "version_value": "1.4.3" } ] } } ] } }, { "vendor_name": "goa.design/goa", "product": { "product_data": [ { "product_name": "goa.design/goa", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", "version_value": "1.4.3" } ] } } ] } }, { "vendor_name": "goa.design/goa/v3", "product": { "product_data": [ { "product_name": "goa.design/goa/v3", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", "version_value": "3.0.9" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://github.com/goadesign/goa/pull/2388", "refsource": "MISC", "name": "https://github.com/goadesign/goa/pull/2388" }, { "url": "https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39", "refsource": "MISC", "name": "https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39" }, { "url": "https://pkg.go.dev/vuln/GO-2020-0032", "refsource": "MISC", "name": "https://pkg.go.dev/vuln/GO-2020-0032" } ] }, "credits": [ { "lang": "en", "value": "@christi3k" } ] }