
Cloud Vulnerability DB
A community-led vulnerabilities database
UltraJSON (CVE-2022-31117) is a vulnerability discovered in UltraJSON, a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. The vulnerability was identified in versions prior to 5.4.0, where an error occurring while reallocating a buffer for string decoding could cause the buffer to get freed twice (GitHub Advisory, Ubuntu Security).
The vulnerability occurs during the string decoding process when an error happens while reallocating the buffer. This condition leads to a potential double free vulnerability, where the same memory buffer is freed twice. However, due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. The vulnerability has been assigned a CVSS base score of 5.9 (Medium), with attack vector being Network, attack complexity High, and no required privileges or user interaction (Ubuntu Security).
If successfully exploited, the vulnerability could potentially lead to memory corruption. However, the practical impact is limited as the double free condition is impossible to trigger from Python due to how UltraJSON implements its internal decoder (GitHub Advisory).
The vulnerability has been fixed in UltraJSON version 5.4.0. Users are advised to upgrade to this version or later as there are no known workarounds for this issue (GitHub Advisory, Red Hat Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."