{"api_version":"1","generated_at":"2026-04-23T02:58:52+00:00","cve":"CVE-2022-0217","urls":{"html":"https://cve.report/CVE-2022-0217","api":"https://cve.report/api/cve/CVE-2022-0217.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0217","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0217"},"summary":{"title":"CVE-2022-0217","description":"It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-08-26 18:15:00","updated_at":"2023-11-07 03:41:00"},"problem_types":["CWE-611","CWE-776"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040639","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2040639","refsource":"MISC","tags":[],"title":"2040639 – (CVE-2022-0217) CVE-2022-0217 prosody: unauthenticated remote Denial of Service Attack","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://prosody.im/security/advisory_20220113/1.patch","name":"https://prosody.im/security/advisory_20220113/1.patch","refsource":"MISC","tags":[],"title":"","mime":"text/x-diff","httpstatus":"200","archivestatus":"404"},{"url":"https://prosody.im/security/advisory_20220113/","name":"https://prosody.im/security/advisory_20220113/","refsource":"MISC","tags":[],"title":"Prosody XMPP server advisory 2022-01-13 (Remote Denial of Service)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0217","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0217","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"217","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"prosody","cpe5":"prosody","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-0217","qid":"179004","title":"Debian Security Update for prosody (DSA 5047-1)"},{"cve":"CVE-2022-0217","qid":"183392","title":"Debian Security Update for prosody (CVE-2022-0217)"},{"cve":"CVE-2022-0217","qid":"282272","title":"Fedora Security Update for prosody (FEDORA-2022-426ea6c0b7)"},{"cve":"CVE-2022-0217","qid":"282278","title":"Fedora Security Update for prosody (FEDORA-2022-50afc572a4)"},{"cve":"CVE-2022-0217","qid":"502165","title":"Alpine Linux Security Update for prosody"},{"cve":"CVE-2022-0217","qid":"690773","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for prosody xmpp server advisory 2022-01-13 (e3ec8b30-757b-11ec-922f-654747404482)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-0217","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"prosody","version":{"version_data":[{"version_value":"Fixed in prosody 0.11.12, Affects all versions with support for WebSockets."}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-776 - Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'), CWE-20 - Improper Input Validation."}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2040639","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040639"},{"refsource":"MISC","name":"https://prosody.im/security/advisory_20220113/","url":"https://prosody.im/security/advisory_20220113/"},{"refsource":"MISC","name":"https://prosody.im/security/advisory_20220113/1.patch","url":"https://prosody.im/security/advisory_20220113/1.patch"}]},"description":{"description_data":[{"lang":"eng","value":"It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611)."}]}},"nvd":{"publishedDate":"2022-08-26 18:15:00","lastModifiedDate":"2023-11-07 03:41:00","problem_types":["CWE-611","CWE-776"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:prosody:prosody:*:*:*:*:*:*:*:*","versionEndExcluding":"0.11.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"217","Ordinal":"225851","Title":"CVE-2022-0217","CVE":"CVE-2022-0217","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"217","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}