First published: Sat Dec 24 2022(Updated: )
A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
redhat/json5 | <2.2.2 | 2.2.2 |
npm/json5 | <1.0.2 | 1.0.2 |
npm/json5 | >=2.0.0<2.2.2 | 2.2.2 |
IBM Security QRadar | <=3.12 | |
JSON5 | <1.0.2 | |
JSON5 | >=2.0.0<2.2.2 | |
Red Hat Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-46175 is classified as a medium severity vulnerability.
To fix CVE-2022-46175, you should update the json5 package to version 2.2.2 or higher, or the rh-sso7-keycloak package to the specified remedial versions.
CVE-2022-46175 affects json5 versions prior to 2.2.2.
Attackers can exploit CVE-2022-46175 to set arbitrary and unexpected keys on objects returned from JSON5.parse.
CVE-2022-46175 is specifically related to the json5 package and its integration within the rh-sso7-keycloak software.