CVE Vulnerabilities

CVE-2022-25236

Exposure of Resource to Wrong Sphere

Published: Feb 16, 2022 | Modified: May 05, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9.8 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.

Weakness

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

Affected Software

NameVendorStart VersionEnd Version
LibexpatLibexpat_project*2.4.5 (excluding)
Red Hat Enterprise Linux 6 Extended Lifecycle SupportRedHatexpat-0:2.0.1-14.el6_10*
Red Hat Enterprise Linux 7RedHatfirefox-0:91.7.0-3.el7_9*
Red Hat Enterprise Linux 7RedHatthunderbird-0:91.7.0-2.el7_9*
Red Hat Enterprise Linux 7RedHatexpat-0:2.1.0-14.el7_9*
Red Hat Enterprise Linux 8RedHatfirefox-0:91.7.0-3.el8_5*
Red Hat Enterprise Linux 8RedHatthunderbird-0:91.7.0-2.el8_5*
Red Hat Enterprise Linux 8RedHatmingw-expat-0:2.4.8-1.el8*
Red Hat Enterprise Linux 8RedHatexpat-0:2.2.5-4.el8_5.3*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatfirefox-0:91.7.0-3.el8_1*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatthunderbird-0:91.7.0-2.el8_1*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatexpat-0:2.2.5-3.el8_1.1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatfirefox-0:91.7.0-3.el8_2*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatthunderbird-0:91.7.0-2.el8_2*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatexpat-0:2.2.5-3.el8_2.2*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatfirefox-0:91.7.0-3.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatthunderbird-0:91.7.0-2.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatexpat-0:2.2.5-4.el8_4.2*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-virtualization-host-0:4.3.22-20220330.1.el7_9*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8RedHatredhat-virtualization-host-0:4.4.10-202203211649_8.5*
Text-Only JBCSRedHatexpat*
Apache2Ubuntutrusty*
Apr-utilUbuntutrusty*
AyttmUbuntutrusty*
AyttmUbuntuxenial*
CableswigUbuntutrusty*
CableswigUbuntuxenial*
CadaverUbuntubionic*
CadaverUbuntufocal*
CadaverUbuntuimpish*
CadaverUbuntukinetic*
CadaverUbuntulunar*
CadaverUbuntumantic*
CadaverUbuntuoracular*
CadaverUbuntuplucky*
CadaverUbuntutrusty*
CadaverUbuntuxenial*
CmakeUbuntutrusty*
Coin3Ubuntubionic*
Coin3Ubuntutrusty*
Coin3Ubuntutrusty/esm*
Coin3Ubuntuxenial*
ExpatUbuntubionic*
ExpatUbuntudevel*
ExpatUbuntuesm-infra-legacy/trusty*
ExpatUbuntuesm-infra/bionic*
ExpatUbuntuesm-infra/focal*
ExpatUbuntuesm-infra/xenial*
ExpatUbuntufocal*
ExpatUbuntuimpish*
ExpatUbuntujammy*
ExpatUbuntukinetic*
ExpatUbuntulunar*
ExpatUbuntumantic*
ExpatUbuntunoble*
ExpatUbuntuoracular*
ExpatUbuntuplucky*
ExpatUbuntuquesting*
ExpatUbuntutrusty*
ExpatUbuntutrusty/esm*
ExpatUbuntuxenial*
FirefoxUbuntubionic*
FirefoxUbuntudevel*
FirefoxUbuntufocal*
FirefoxUbuntuimpish*
FirefoxUbuntujammy*
FirefoxUbuntukinetic*
FirefoxUbuntulunar*
FirefoxUbuntumantic*
FirefoxUbuntunoble*
FirefoxUbuntuoracular*
FirefoxUbuntuplucky*
FirefoxUbuntuquesting*
FirefoxUbuntutrusty*
FirefoxUbuntuxenial*
GdcmUbuntutrusty*
GhostscriptUbuntutrusty*
InsighttoolkitUbuntutrusty*
InsighttoolkitUbuntuxenial*
Insighttoolkit4Ubuntuimpish*
Insighttoolkit4Ubuntutrusty*
Insighttoolkit4Ubuntuxenial*
LibxmltokUbuntubionic*
LibxmltokUbuntuesm-apps/bionic*
LibxmltokUbuntuesm-apps/focal*
LibxmltokUbuntuesm-apps/jammy*
LibxmltokUbuntuesm-apps/noble*
LibxmltokUbuntuesm-apps/xenial*
LibxmltokUbuntufocal*
LibxmltokUbuntuhirsute*
LibxmltokUbuntuimpish*
LibxmltokUbuntujammy*
LibxmltokUbuntukinetic*
LibxmltokUbuntulunar*
LibxmltokUbuntumantic*
LibxmltokUbuntunoble*
LibxmltokUbuntuoracular*
LibxmltokUbuntuplucky*
LibxmltokUbuntutrusty*
LibxmltokUbuntuupstream*
LibxmltokUbuntuxenial*
MatanzaUbuntubionic*
MatanzaUbuntudevel*
MatanzaUbuntuesm-apps/bionic*
MatanzaUbuntuesm-apps/focal*
MatanzaUbuntuesm-apps/jammy*
MatanzaUbuntuesm-apps/noble*
MatanzaUbuntuesm-apps/xenial*
MatanzaUbuntufocal*
MatanzaUbuntuimpish*
MatanzaUbuntujammy*
MatanzaUbuntukinetic*
MatanzaUbuntulunar*
MatanzaUbuntumantic*
MatanzaUbuntunoble*
MatanzaUbuntuoracular*
MatanzaUbuntuplucky*
MatanzaUbuntuquesting*
MatanzaUbuntutrusty*
MatanzaUbuntuxenial*
SmartUbuntutrusty*
Swish-eUbuntubionic*
Swish-eUbuntufocal*
Swish-eUbuntuimpish*
Swish-eUbuntukinetic*
Swish-eUbuntulunar*
Swish-eUbuntumantic*
Swish-eUbuntuoracular*
Swish-eUbuntuplucky*
Swish-eUbuntutrusty*
Swish-eUbuntuxenial*
TdomUbuntubionic*
TdomUbuntufocal*
TdomUbuntuimpish*
TdomUbuntukinetic*
TdomUbuntulunar*
TdomUbuntumantic*
TdomUbuntuoracular*
TdomUbuntuplucky*
TdomUbuntutrusty*
TdomUbuntuxenial*
Texlive-binUbuntutrusty*
ThunderbirdUbuntubionic*
ThunderbirdUbuntudevel*
ThunderbirdUbuntufocal*
ThunderbirdUbuntuimpish*
ThunderbirdUbuntujammy*
ThunderbirdUbuntukinetic*
ThunderbirdUbuntulunar*
ThunderbirdUbuntumantic*
ThunderbirdUbuntunoble*
ThunderbirdUbuntuoracular*
ThunderbirdUbuntuplucky*
ThunderbirdUbuntuquesting*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuxenial*
Vnc4Ubuntubionic*
Vnc4Ubuntutrusty*
Vnc4Ubuntutrusty/esm*
Vnc4Ubuntuxenial*
VtkUbuntutrusty*
VtkUbuntutrusty/esm*
VtkUbuntuxenial*
Wbxml2Ubuntubionic*
Wbxml2Ubuntufocal*
Wbxml2Ubuntuimpish*
Wbxml2Ubuntukinetic*
Wbxml2Ubuntulunar*
Wbxml2Ubuntumantic*
Wbxml2Ubuntuoracular*
Wbxml2Ubuntuplucky*
Wbxml2Ubuntutrusty*
Wbxml2Ubuntuxenial*
Xmlrpc-cUbuntubionic*
Xmlrpc-cUbuntudevel*
Xmlrpc-cUbuntuesm-apps/bionic*
Xmlrpc-cUbuntuesm-apps/focal*
Xmlrpc-cUbuntuesm-apps/jammy*
Xmlrpc-cUbuntuesm-apps/noble*
Xmlrpc-cUbuntuesm-apps/xenial*
Xmlrpc-cUbuntuesm-infra-legacy/trusty*
Xmlrpc-cUbuntufocal*
Xmlrpc-cUbuntuimpish*
Xmlrpc-cUbuntujammy*
Xmlrpc-cUbuntukinetic*
Xmlrpc-cUbuntulunar*
Xmlrpc-cUbuntumantic*
Xmlrpc-cUbuntunoble*
Xmlrpc-cUbuntuoracular*
Xmlrpc-cUbuntuplucky*
Xmlrpc-cUbuntuquesting*
Xmlrpc-cUbuntutrusty*
Xmlrpc-cUbuntutrusty/esm*
Xmlrpc-cUbuntuxenial*

Extended Description

Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing these private files. If the file permissions are insecure, then parties other than the user will be able to access those files. A separate control sphere might effectively require that the user can only access the private files, but not any other files on the system. If the program does not ensure that the user is only requesting private files, then the user might be able to access other files on the system. In either case, the end result is that a resource has been exposed to the wrong party.

References