LiteDB is a small, fast and lightweight .NET NoSQL embedded database. Versions prior to 5.0.13 are subject to Deserialization of Untrusted Data. LiteDB uses a special field in JSON documents to cast different types from `BsonDocument` to POCO classes. When instances of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit into your model. If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit into your model. This issue is patched in version 5.0.13 with some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type. The next major version will contain an allow-list to select what kind of Assembly can be loaded. Workarounds are detailed in the vendor advisory.
Vulnerable Library - litedb.3.1.0.nupkg
Embedded .NET NoSQL Document Store in a single data file
Library home page: https://api.nuget.org/packages/litedb.3.1.0.nupkg
Found in HEAD commit: 0bc8705a3c3524a4b4a75d9f6120502aab4494d6
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-23535
### Vulnerable Libraries - litedb.3.1.0.nupkg, litedb.3.1.0.nupkg### litedb.3.1.0.nupkg
Embedded .NET NoSQL Document Store in a single data file
Library home page: https://api.nuget.org/packages/litedb.3.1.0.nupkg
Dependency Hierarchy: - :x: **litedb.3.1.0.nupkg** (Vulnerable Library) ### litedb.3.1.0.nupkg
Embedded .NET NoSQL Document Store in a single data file
Library home page: https://api.nuget.org/packages/litedb.3.1.0.nupkg
Path to vulnerable library: /Modules/WebAnalytics/packages/LiteDB.3.1.0/LiteDB.3.1.0.nupkg
Dependency Hierarchy: - :x: **litedb.3.1.0.nupkg** (Vulnerable Library)
Found in HEAD commit: 0bc8705a3c3524a4b4a75d9f6120502aab4494d6
Found in base branch: dev
### Vulnerability DetailsLiteDB is a small, fast and lightweight .NET NoSQL embedded database. Versions prior to 5.0.13 are subject to Deserialization of Untrusted Data. LiteDB uses a special field in JSON documents to cast different types from `BsonDocument` to POCO classes. When instances of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit into your model. If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit into your model. This issue is patched in version 5.0.13 with some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type. The next major version will contain an allow-list to select what kind of Assembly can be loaded. Workarounds are detailed in the vendor advisory.
Publish Date: 2023-02-24
URL: CVE-2022-23535
### CVSS 3 Score Details (9.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-23535
Release Date: 2023-02-24
Fix Resolution: LiteDB - 5.0.13
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)