Miggo Logo

CVE-2022-0084: XNIO `notifyReadClosed` method logging message to unexpected end

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.38484%
Published
8/27/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jboss.xnio:xnio-allmaven<= 3.8.7.Final

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the use of e.printStackTrace() in notifyReadClosed, which bypasses proper logging mechanisms. The commit explicitly replaces this with a controlled logger (log.error()), confirming the vulnerability was in this method. While notifyWriteClosed was also patched, the CVE title and descriptions specifically reference notifyReadClosed as the primary vector. The direct connection between the vulnerability description, CWE-770 (resource allocation without throttling), and the patch confirms high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in XNIO, sp**i*i**lly in t** `noti*yR****los**` m*t*o*. T** issu* r*v**l** t*is m*t*o* w*s lo**in* * m*ss*** to *not**r *xp**t** *n*. T*is *l*w *llows *n *tt**k*r to s*n* *l*w** r*qu*sts to * s*rv*r, possi*ly **usin* lo* *ont*ntion-r

Reasoning

T** vuln*r**ility st*ms *rom t** us* o* `*.printSt**kTr***()` in noti*yR****los**, w*i** *yp*ss*s prop*r lo**in* m****nisms. T** *ommit *xpli*itly r*pl***s t*is wit* * *ontroll** lo***r (`lo*.*rror()`), *on*irmin* t** vuln*r**ility w*s in t*is m*t*o*