Skip to main content

CVE-2022-23459: CWE-416 Use After Free in hjiang Jsonxx

Medium
Published: Fri Aug 19 2022 (08/19/2022, 19:00:16 UTC)
Source: CVE
Vendor/Project: hjiang
Product: Jsonxx

Description

Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement.

AI-Powered Analysis

AILast updated: 06/23/2025, 00:21:17 UTC

Technical Analysis

CVE-2022-23459 is a use-after-free and double-free vulnerability identified in the Jsonxx (also known as Json++) library, a C++ JSON parser, writer, and reader. The vulnerability arises from the improper handling of the Value class within Jsonxx. Specifically, the default assignment operator of the Value class can be used with pointer types that point to mutable data without updating the pointer itself. This leads to scenarios where memory may be freed multiple times (double free) or accessed after it has been freed (use after free), resulting in memory corruption. Such memory corruption can cause undefined behavior, including application crashes, data corruption, or potentially arbitrary code execution if exploited. The Jsonxx project has been archived and is no longer maintained, meaning no patches or updates are forthcoming to address this vulnerability. The affected versions are unspecified but presumed to include all versions of Jsonxx prior to archiving. No known exploits have been reported in the wild to date. Given the nature of the vulnerability, exploitation would typically require the attacker to influence or control JSON data processed by the vulnerable application, potentially requiring some level of user interaction or input injection. The vulnerability affects the confidentiality, integrity, and availability of applications using Jsonxx due to the risk of memory corruption and potential arbitrary code execution.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the extent to which Jsonxx is used within their software stacks. Organizations relying on legacy or embedded systems that incorporate Jsonxx for JSON processing may be at risk. Exploitation could lead to application crashes, denial of service, or in worst cases, remote code execution, compromising system integrity and availability. This is particularly critical for sectors with high reliance on embedded or legacy C++ applications, such as industrial control systems, telecommunications, and certain financial services. The lack of ongoing maintenance for Jsonxx increases the risk profile, as no official patches or mitigations will be released, forcing organizations to seek alternative JSON libraries or implement custom mitigations. The vulnerability could also be leveraged as an initial attack vector in multi-stage attacks targeting sensitive data or critical infrastructure. Given the absence of known exploits, the immediate risk is moderate, but the potential impact on confidentiality, integrity, and availability remains significant if exploited.

Mitigation Recommendations

1. Immediate replacement of Jsonxx with a modern, actively maintained JSON library that provides robust memory management and security guarantees, such as RapidJSON, nlohmann/json, or similar. 2. Conduct a thorough audit of all internal and third-party software to identify any usage of Jsonxx, including embedded systems and legacy applications. 3. Where replacement is not immediately feasible, implement strict input validation and sanitization on all JSON data processed by applications using Jsonxx to reduce the risk of maliciously crafted inputs triggering the vulnerability. 4. Employ runtime memory protection mechanisms such as AddressSanitizer (ASan) during development and testing to detect use-after-free and double-free errors early. 5. Increase monitoring and logging around applications using Jsonxx to detect abnormal crashes or behavior that may indicate exploitation attempts. 6. For critical systems, consider network segmentation and application-layer firewalls to limit exposure to untrusted inputs that could exploit this vulnerability. 7. Engage with software vendors and suppliers to confirm whether their products use Jsonxx and advocate for timely remediation or product updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3aa2

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 12:21:17 AM

Last updated: 7/30/2025, 6:50:58 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats