<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Go-Git — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/go-git/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 18:27:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/go-git/feed.xml" rel="self" type="application/rss+xml"/><item><title>go-billy Path Traversal Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-go-billy-path-traversal/</link><pubDate>Thu, 14 May 2026 18:27:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-go-billy-path-traversal/</guid><description>Multiple path traversal vulnerabilities exist in go-billy, particularly affecting the `osfs.ChrootOS` implementation, where crafted paths can escape intended base directories due to insufficient path sanitization and boundary enforcement; users requiring stronger security should upgrade to v6 and use `os.Root`.</description><content:encoded><![CDATA[<p>The <code>go-billy</code> library has multiple path traversal vulnerabilities due to insufficient path sanitization and boundary enforcement. Crafted paths, particularly using <code>..</code>, can escape the intended base directories. The <code>osfs.ChrootOS</code> implementation is affected and has been deprecated in <code>v5</code> and removed in <code>v6</code>. Applications relying on <code>go-billy</code> for some level of isolation may inadvertently expose access to unintended filesystem locations. Users requiring stronger security boundary enforcement are advised to upgrade to <code>v6</code>, where the <code>osfs</code> implementation is backed by the traversal-resistant primitive <code>os.Root</code>. Versions prior to <code>v5</code> are likely affected; upgrading to a supported version is recommended. The vulnerability is identified as CVE-2026-44973.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious path using directory traversal sequences (e.g., <code>../</code>) designed to escape the intended file system boundaries.</li>
<li>The application using <code>go-billy</code> receives the crafted path, intending to access a file within a restricted directory.</li>
<li>The application calls <code>go-billy</code> functions (e.g., <code>Open</code>, <code>ReadFile</code>, <code>Stat</code>) to interact with the file system using the attacker-controlled path.</li>
<li>Due to insufficient sanitization within the vulnerable <code>osfs.ChrootOS</code> implementation, the traversal sequences are not properly resolved or blocked.</li>
<li><code>go-billy</code>&rsquo;s file system access functions resolve the path, allowing the attacker to navigate outside the intended directory and access sensitive files or directories.</li>
<li>The application reads or modifies files outside the intended scope, leading to potential information disclosure or arbitrary file manipulation.</li>
<li>The attacker gains unauthorized access to sensitive data or system resources.</li>
<li>The attacker may further exploit the compromised system to achieve lateral movement or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these path traversal vulnerabilities can lead to unauthorized access to sensitive files and directories, potentially resulting in information disclosure or arbitrary file manipulation. The number of victims and targeted sectors depend on the specific applications using the vulnerable <code>go-billy</code> library. If the attack succeeds, attackers can bypass intended security boundaries, read configuration files, or even modify critical system files, leading to complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>go-billy</code> version 6 or later to leverage the more secure <code>os.Root</code> implementation for <code>osfs</code> to prevent CVE-2026-44973.</li>
<li>Migrate away from <code>osfs.ChrootOS</code> and use <code>osfs.BoundOS</code> instead, as <code>osfs.ChrootOS</code> is deprecated and vulnerable as noted in the overview.</li>
<li>Enable process creation logging on affected systems to facilitate detection of suspicious file access patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>go-billy</category><category>CVE-2026-44973</category></item></channel></rss>