CVE-2022-23495: CWE-755: Improper Handling of Exceptional Conditions in ipfs go-merkledag
go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
AI Analysis
Technical Summary
CVE-2022-23495 is a medium-severity vulnerability affecting the go-merkledag component of the IPFS (InterPlanetary File System) project, specifically versions from 0.4.0 up to but not including 0.8.1. The go-merkledag package implements the DAGService interface and supports two IPLD node types: Protobuf (ProtoNode) and Raw. The vulnerability arises from improper handling of exceptional conditions (CWE-755) during the encoding process of ProtoNode objects. ProtoNodes are expected to encode only valid DAG-PB (Directed Acyclic Graph - Protocol Buffers) structures. However, certain modifier methods allow a ProtoNode to be placed into an unencodeable state by manipulating its internal structure or metadata, such as the CidBuilder or Tsize (Link#Size) values. When methods that require re-encoding the node are called, they panic because the encoding process fails and these methods do not return errors but instead cause a runtime panic. This can lead to denial of service (DoS) conditions in applications relying on go-merkledag, as panics typically crash the running process unless properly recovered. The root cause is that the code does not safely handle exceptional states or invalid input that leads to encoding errors, violating robust error handling practices. The vulnerability has been addressed in version 0.8.1 through multiple pull requests that add proper validation and error handling. For users unable to upgrade, mitigation involves sanitizing user inputs that affect the CidBuilder and ensuring Tsize values are reasonable and consistent with expected byte sizes for sub-DAGs to prevent malformed ProtoNodes. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations utilizing IPFS or software components that depend on go-merkledag versions prior to 0.8.1, this vulnerability poses a risk primarily of denial of service. An attacker or malicious user who can supply or manipulate ProtoNode data could trigger panics, causing service interruptions or crashes in distributed storage, content addressing, or blockchain-related applications leveraging IPFS. This could disrupt data availability and reliability, impacting critical infrastructure, research data sharing, or decentralized applications. While the vulnerability does not directly lead to data confidentiality breaches or unauthorized access, the integrity of service availability is compromised. Organizations relying on IPFS for content distribution, especially in sectors like finance, healthcare, or government where data availability is crucial, may face operational risks. The impact is heightened in environments where user input is accepted for node construction or modification without strict validation. Given IPFS's growing adoption in European tech ecosystems and research institutions, the vulnerability's exploitation could degrade trust in decentralized storage solutions and cause cascading effects in dependent systems.
Mitigation Recommendations
1. Upgrade to go-merkledag version 0.8.1 or later immediately to apply the official fixes addressing the improper handling of exceptional conditions. 2. For environments where upgrading is not feasible, implement strict input validation and sanitization for any user-supplied data that influences ProtoNode construction, especially the CidBuilder and Tsize (Link#Size) fields. 3. Introduce runtime safeguards such as panic recovery mechanisms around calls to go-merkledag methods that may panic, to prevent full application crashes. 4. Conduct thorough code reviews and static analysis on any custom code interacting with go-merkledag to ensure no unsafe assumptions about node validity are made. 5. Monitor application logs for panic events or encoding errors indicative of attempted exploitation. 6. Limit exposure of interfaces that accept ProtoNode modifications to trusted users or systems to reduce attack surface. 7. Engage in regular dependency audits to track and update vulnerable IPFS components promptly.
Affected Countries
Germany, France, Netherlands, Sweden, Finland, United Kingdom, Switzerland, Belgium
CVE-2022-23495: CWE-755: Improper Handling of Exceptional Conditions in ipfs go-merkledag
Description
go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
AI-Powered Analysis
Technical Analysis
CVE-2022-23495 is a medium-severity vulnerability affecting the go-merkledag component of the IPFS (InterPlanetary File System) project, specifically versions from 0.4.0 up to but not including 0.8.1. The go-merkledag package implements the DAGService interface and supports two IPLD node types: Protobuf (ProtoNode) and Raw. The vulnerability arises from improper handling of exceptional conditions (CWE-755) during the encoding process of ProtoNode objects. ProtoNodes are expected to encode only valid DAG-PB (Directed Acyclic Graph - Protocol Buffers) structures. However, certain modifier methods allow a ProtoNode to be placed into an unencodeable state by manipulating its internal structure or metadata, such as the CidBuilder or Tsize (Link#Size) values. When methods that require re-encoding the node are called, they panic because the encoding process fails and these methods do not return errors but instead cause a runtime panic. This can lead to denial of service (DoS) conditions in applications relying on go-merkledag, as panics typically crash the running process unless properly recovered. The root cause is that the code does not safely handle exceptional states or invalid input that leads to encoding errors, violating robust error handling practices. The vulnerability has been addressed in version 0.8.1 through multiple pull requests that add proper validation and error handling. For users unable to upgrade, mitigation involves sanitizing user inputs that affect the CidBuilder and ensuring Tsize values are reasonable and consistent with expected byte sizes for sub-DAGs to prevent malformed ProtoNodes. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations utilizing IPFS or software components that depend on go-merkledag versions prior to 0.8.1, this vulnerability poses a risk primarily of denial of service. An attacker or malicious user who can supply or manipulate ProtoNode data could trigger panics, causing service interruptions or crashes in distributed storage, content addressing, or blockchain-related applications leveraging IPFS. This could disrupt data availability and reliability, impacting critical infrastructure, research data sharing, or decentralized applications. While the vulnerability does not directly lead to data confidentiality breaches or unauthorized access, the integrity of service availability is compromised. Organizations relying on IPFS for content distribution, especially in sectors like finance, healthcare, or government where data availability is crucial, may face operational risks. The impact is heightened in environments where user input is accepted for node construction or modification without strict validation. Given IPFS's growing adoption in European tech ecosystems and research institutions, the vulnerability's exploitation could degrade trust in decentralized storage solutions and cause cascading effects in dependent systems.
Mitigation Recommendations
1. Upgrade to go-merkledag version 0.8.1 or later immediately to apply the official fixes addressing the improper handling of exceptional conditions. 2. For environments where upgrading is not feasible, implement strict input validation and sanitization for any user-supplied data that influences ProtoNode construction, especially the CidBuilder and Tsize (Link#Size) fields. 3. Introduce runtime safeguards such as panic recovery mechanisms around calls to go-merkledag methods that may panic, to prevent full application crashes. 4. Conduct thorough code reviews and static analysis on any custom code interacting with go-merkledag to ensure no unsafe assumptions about node validity are made. 5. Monitor application logs for panic events or encoding errors indicative of attempted exploitation. 6. Limit exposure of interfaces that accept ProtoNode modifications to trusted users or systems to reduce attack surface. 7. Engage in regular dependency audits to track and update vulnerable IPFS components promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T21:23:53.766Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4cb3
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 12:37:13 PM
Last updated: 8/5/2025, 2:53:42 AM
Views: 9
Related Threats
CVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.