Vulnerability Description
Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at `github.com/ipfs/go-libipfs/bitswap` because users then transitively import `github.com/ipfs/go-libipfs/bitswap/server`. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at `github.com/ipfs/go-libipfs/bitswap` not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: `github.com/ipfs/go-libipfs/bitswap/client`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Protocol | Boxo | 0.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916Patch
- https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197Patch
- https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974Patch
- https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5MitigationPatchVendor Advisory
- https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916Patch
- https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197Patch
- https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974Patch
- https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5MitigationPatchVendor Advisory
FAQ
What is CVE-2023-25568?
CVE-2023-25568 is a vulnerability with a CVSS score of 8.2 (HIGH). Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap se...
How severe is CVE-2023-25568?
CVE-2023-25568 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25568?
Check the references section above for vendor advisories and patch information. Affected products include: Protocol Boxo.