GSD-2023-22460
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it doesn't expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-22460",
"id": "GSD-2023-22460"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-22460"
],
"details": "go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it doesn\u0027t expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes.",
"id": "GSD-2023-22460",
"modified": "2023-12-13T01:20:42.665953Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-22460",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "go-ipld-prime",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003c 0.19.0"
}
]
}
}
]
},
"vendor_name": "ipld"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it doesn\u0027t expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-20",
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92",
"refsource": "MISC",
"url": "https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92"
},
{
"name": "https://github.com/ipld/go-ipld-prime/pull/472",
"refsource": "MISC",
"url": "https://github.com/ipld/go-ipld-prime/pull/472"
},
{
"name": "https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0",
"refsource": "MISC",
"url": "https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0"
}
]
},
"source": {
"advisory": "GHSA-c653-6hhg-9x92",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003cv0.19.0",
"affected_versions": "All versions before 0.19.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2023-02-14",
"description": "go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it does not expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes.",
"fixed_versions": [
"v0.19.0"
],
"identifier": "CVE-2023-22460",
"identifiers": [
"GHSA-c653-6hhg-9x92",
"CVE-2023-22460"
],
"not_impacted": "All versions starting from 0.19.0",
"package_slug": "go/github.com/ipld/go-ipld-prime",
"pubdate": "2023-01-05",
"solution": "Upgrade to version 0.19.0 or above.",
"title": "Improper Input Validation",
"urls": [
"https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92",
"https://nvd.nist.gov/vuln/detail/CVE-2023-22460",
"https://github.com/ipld/go-ipld-prime/pull/472",
"https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0",
"https://pkg.go.dev/vuln/GO-2023-1269",
"https://github.com/advisories/GHSA-c653-6hhg-9x92"
],
"uuid": "2667ff86-747a-4ac6-836b-d435bc6cbbb5",
"versions": [
{
"commit": {
"sha": "ac99fc3ecbe040a04ff4dcb83a00c9f65e863b15",
"tags": [
"v0.19.0"
],
"timestamp": "20221014025749"
},
"number": "v0.19.0"
}
]
},
{
"affected_range": "\u003cv0.19.0",
"affected_versions": "All versions before 0.19.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2023-01-10",
"description": "go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it does not expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes.",
"fixed_versions": [
"v0.19.0"
],
"identifier": "CVE-2023-22460",
"identifiers": [
"CVE-2023-22460",
"GHSA-c653-6hhg-9x92"
],
"not_impacted": "",
"package_slug": "go/github.com/ipld/go-ipld-prime/codec/json",
"pubdate": "2023-01-04",
"solution": "Upgrade to version 0.19.0 or above.",
"title": "Improper Input Validation",
"urls": [
"https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92",
"https://nvd.nist.gov/vuln/detail/CVE-2023-22460",
"https://github.com/ipld/go-ipld-prime/pull/472",
"https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0",
"https://github.com/advisories/GHSA-c653-6hhg-9x92"
],
"uuid": "9badbeb0-ecb1-4608-b19a-90202a574d7e",
"versions": [
{
"commit": {
"sha": "ac99fc3ecbe040a04ff4dcb83a00c9f65e863b15",
"tags": [
"v0.19.0"
],
"timestamp": "20221014025749"
},
"number": "v0.19.0"
}
]
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:protocol:go-ipld-prime:*:*:*:*:*:go:*:*",
"cpe_name": [],
"versionEndExcluding": "0.19.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-22460"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Encoding data which contains a Bytes kind Node will pass a Bytes token to the JSON encoder which will panic as it doesn\u0027t expect to receive Bytes tokens. Such an encode should be treated as an error, as plain JSON should not be able to encode Bytes. This only impacts uses of the `json` codec. `dag-json` is not impacted. Use of `json` as a decoder is not impacted. This issue is fixed in v0.19.0. As a workaround, one may prefer the `dag-json` codec, which has the ability to encode bytes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92"
},
{
"name": "https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0",
"refsource": "MISC",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0"
},
{
"name": "https://github.com/ipld/go-ipld-prime/pull/472",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipld/go-ipld-prime/pull/472"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-01-10T19:29Z",
"publishedDate": "2023-01-04T15:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…