CVE-2022-23495 (GCVE-0-2022-23495)
Vulnerability from cvelistv5 – Published: 2022-12-08 21:25 – Updated: 2025-04-23 16:31
VLAI?
Summary
go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
Severity ?
7.5 (High)
CWE
- CWE-755 - Improper Handling of Exceptional Conditions
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ipfs | go-merkledag |
Affected:
>= 0.4.0, < 0.8.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:43:46.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"name": "https://github.com/ipfs/go-merkledag/issues/90",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"name": "https://github.com/ipfs/kubo/issues/9297",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/91",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/92",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/93",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"name": "https://en.wikipedia.org/wiki/Directed_acyclic_graph",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"name": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"name": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23495",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T15:48:01.494241Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-23T16:31:04.725Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "go-merkledag",
"vendor": "ipfs",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.4.0, \u003c 0.8.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "go-merkledag implements the \u0027DAGService\u0027 interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don\u0027t allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-755",
"description": "CWE-755: Improper Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-08T21:25:40.257Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"name": "https://github.com/ipfs/go-merkledag/issues/90",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"name": "https://github.com/ipfs/kubo/issues/9297",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/91",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/92",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"name": "https://github.com/ipfs/go-merkledag/pull/93",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"name": "https://en.wikipedia.org/wiki/Directed_acyclic_graph",
"tags": [
"x_refsource_MISC"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"name": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"name": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
}
],
"source": {
"advisory": "GHSA-x39j-h85h-3f46",
"discovery": "UNKNOWN"
},
"title": "ProtoNode may be modified such that common method calls may panic in ipfs/go-merkledag"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-23495",
"datePublished": "2022-12-08T21:25:40.257Z",
"dateReserved": "2022-01-19T21:23:53.766Z",
"dateUpdated": "2025-04-23T16:31:04.725Z",
"requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.4.0\", \"versionEndExcluding\": \"0.8.1\", \"matchCriteriaId\": \"02537CFA-1940-4266-BAB5-D06516862DA8\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"go-merkledag implements the \u0027DAGService\u0027 interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don\u0027t allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\\n\"}, {\"lang\": \"es\", \"value\": \"go-merkledag implementa la interfaz \u0027DAGService\u0027 y agrega dos tipos de nodos ipld, Protobuf y Raw para el proyecto ipfs. Un `ProtoNode` puede modificarse de tal manera que cause varios errores de codificaci\\u00f3n que provocar\\u00e1n p\\u00e1nico en llamadas a m\\u00e9todos comunes que no permiten devoluciones de errores. Un `ProtoNode` solo deber\\u00eda poder codificar en DAG-PB v\\u00e1lido; intentar codificar formularios DAG-PB no v\\u00e1lidos generar\\u00e1 un error en el c\\u00f3dec. La manipulaci\\u00f3n de un \\\"ProtoNodo\\\" existente (reci\\u00e9n creado o decodificado) utilizando los m\\u00e9todos modificadores no tuvo en cuenta ciertos estados que colocar\\u00edan el \\\"ProtoNodo\\\" en una forma no codificable. Debido a la conformidad con [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) y [` github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, ciertos m\\u00e9todos, que internamente requieren una re-encode si el estado ha cambiado, entrar\\u00e1 en p\\u00e1nico debido a la imposibilidad de devolver un error. Este problema se ha solucionado en varias solicitudes de extracci\\u00f3n. Se recomienda a los usuarios que actualicen a la versi\\u00f3n 0.8.1 para obtener un conjunto completo de correcciones. Los usuarios que no puedan actualizar pueden intentar mitigar este problema desinfectando las entradas cuando permiten que las entradas del usuario establezcan un nuevo `CidBuilder` en un `ProtoNode` y sanitizando los valores de `Tsize` (`Link#Size`) de modo que sean razonables. El tama\\u00f1o de bytes para sub-DAG se deriva de la entrada del usuario.\"}]",
"id": "CVE-2022-23495",
"lastModified": "2024-11-21T06:48:40.890",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2022-12-08T22:15:10.233",
"references": "[{\"url\": \"https://en.wikipedia.org/wiki/Directed_acyclic_graph\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/issues/90\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/91\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/92\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/93\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/kubo/issues/9297\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://en.wikipedia.org/wiki/Directed_acyclic_graph\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/issues/90\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/91\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/92\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/pull/93\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/ipfs/kubo/issues/9297\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-755\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-252\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-23495\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-12-08T22:15:10.233\",\"lastModified\":\"2024-11-21T06:48:40.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"go-merkledag implements the \u0027DAGService\u0027 interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don\u0027t allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\\n\"},{\"lang\":\"es\",\"value\":\"go-merkledag implementa la interfaz \u0027DAGService\u0027 y agrega dos tipos de nodos ipld, Protobuf y Raw para el proyecto ipfs. Un `ProtoNode` puede modificarse de tal manera que cause varios errores de codificaci\u00f3n que provocar\u00e1n p\u00e1nico en llamadas a m\u00e9todos comunes que no permiten devoluciones de errores. Un `ProtoNode` solo deber\u00eda poder codificar en DAG-PB v\u00e1lido; intentar codificar formularios DAG-PB no v\u00e1lidos generar\u00e1 un error en el c\u00f3dec. La manipulaci\u00f3n de un \\\"ProtoNodo\\\" existente (reci\u00e9n creado o decodificado) utilizando los m\u00e9todos modificadores no tuvo en cuenta ciertos estados que colocar\u00edan el \\\"ProtoNodo\\\" en una forma no codificable. Debido a la conformidad con [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) y [` github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, ciertos m\u00e9todos, que internamente requieren una re-encode si el estado ha cambiado, entrar\u00e1 en p\u00e1nico debido a la imposibilidad de devolver un error. Este problema se ha solucionado en varias solicitudes de extracci\u00f3n. Se recomienda a los usuarios que actualicen a la versi\u00f3n 0.8.1 para obtener un conjunto completo de correcciones. Los usuarios que no puedan actualizar pueden intentar mitigar este problema desinfectando las entradas cuando permiten que las entradas del usuario establezcan un nuevo `CidBuilder` en un `ProtoNode` y sanitizando los valores de `Tsize` (`Link#Size`) de modo que sean razonables. El tama\u00f1o de bytes para sub-DAG se deriva de la entrada del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-252\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.4.0\",\"versionEndExcluding\":\"0.8.1\",\"matchCriteriaId\":\"02537CFA-1940-4266-BAB5-D06516862DA8\"}]}]}],\"references\":[{\"url\":\"https://en.wikipedia.org/wiki/Directed_acyclic_graph\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/issues/90\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/91\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/92\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/93\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/kubo/issues/9297\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://en.wikipedia.org/wiki/Directed_acyclic_graph\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/issues/90\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/91\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/92\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/pull/93\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/ipfs/kubo/issues/9297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…