Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-46175
HistoryDec 24, 2022 - 12:00 a.m.

CVE-2022-46175

2022-12-2400:00:00
ubuntu.com
ubuntu.com
23
json5
prototype pollution
security impact
denial of service
cross-site scripting
privilege elevation
remote code execution
patch
vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.006 Low

EPSS

Percentile

77.9%

JSON5 is an extension to the popular JSON file format that aims to be
easier to write and maintain by hand (e.g. for config files). The parse
method of the JSON5 library before and including versions 1.0.1 and 2.2.1
does not restrict parsing of keys named __proto__, allowing specially
crafted strings to pollute the prototype of the resulting object. This
vulnerability pollutes the prototype of the object returned by
JSON5.parse and not the global Object prototype, which is the commonly
understood definition of Prototype Pollution. However, polluting the
prototype of a single object can have significant security impact for an
application if the object is later used in trusted operations. This
vulnerability could allow an attacker to set arbitrary and unexpected keys
on the object returned from JSON5.parse. The actual impact will depend on
how applications utilize the returned object and how they filter unwanted
keys, but could include denial of service, cross-site scripting, elevation
of privilege, and in extreme cases, remote code execution. JSON5.parse
should restrict parsing of __proto__ keys when parsing JSON strings to
objects. As a point of reference, the JSON.parse method included in
JavaScript ignores __proto__ keys. Simply changing JSON5.parse to
JSON.parse in the examples above mitigates this vulnerability. This
vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchnode-json5<ย 0.5.1-1ubuntu0.1~esm1UNKNOWN
ubuntu20.04noarchnode-json5<ย 0.5.1-3ubuntu0.1UNKNOWN
ubuntu22.04noarchnode-json5<ย 2.2.0+dfsg-1ubuntu0.1~esm1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.006 Low

EPSS

Percentile

77.9%