Vulnerability Details : CVE-2022-23495
go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
Products affected by CVE-2022-23495
- cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23495
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23495
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-23495
-
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.Assigned by: nvd@nist.gov (Primary)
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-23495
-
https://github.com/ipfs/kubo/issues/9297
`ipfs add` with exotic hash functions panics (the daemon and the client) · Issue #9297 · ipfs/kubo · GitHubPatch;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1
Release v0.8.1 · ipfs/go-merkledag · GitHubRelease Notes;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/pull/91
feat: check that the CidBuilder hasher is usable by rvagg · Pull Request #91 · ipfs/go-merkledag · GitHubPatch;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/pull/93
feat: improve broken cid.Builder testing for CidBuilder by rvagg · Pull Request #93 · ipfs/go-merkledag · GitHubPatch;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/issues/90
`(*ProtoNode).RawData` use incorrectly panic instead of returning · Issue #90 · ipfs/go-merkledag · GitHubPatch;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/pull/92
feat: check links on setting and sanitise on encoding by rvagg · Pull Request #92 · ipfs/go-merkledag · GitHubPatch;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46
ProtoNode may be modified such that common method calls may panic · Advisory · ipfs/go-merkledag · GitHubThird Party Advisory
-
https://en.wikipedia.org/wiki/Directed_acyclic_graph
Directed acyclic graph - WikipediaTechnical Description;Third Party Advisory
-
https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0
Release v0.8.0 · ipfs/go-merkledag · GitHubRelease Notes;Third Party Advisory
Jump to