2023-07-13 20:00:41 +00:00

122 lines
4.1 KiB
JSON

{
"id": "CVE-2022-23459",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-08-19T19:15:07.600",
"lastModified": "2023-07-13T17:16:54.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement."
},
{
"lang": "es",
"value": "Jsonxx o Json++ es un analizador, escritor y lector de JSON escrito en C++. En versiones afectadas de jsonxx el uso de la clase Value puede conllevar a una corrupci\u00f3n de memoria por medio de una doble liberaci\u00f3n o de un uso de memoria previamente liberada. La clase Value presenta un operador de asignaci\u00f3n por defecto que puede ser usado con tipos de punteros que pueden apuntar a datos alterables donde el propio puntero no es actualizado. Este problema se presenta en el commit actual del proyecto jsonxx. El proyecto en s\u00ed ha sido archivado y no son esperadas actualizaciones. Es recomendado a usuarios buscar un sustituto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
},
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:json\\+\\+_project:json\\+\\+:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3FE9F1-CD11-4BA9-86D9-9F4887D8814D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:json\\+\\+_project:json\\+\\+:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7B9E9A-8AAC-4348-A21F-CF6273294E63"
}
]
}
]
}
],
"references": [
{
"url": "https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
}
]
}