{"vulnerability": "CVE-2023-26248", "sightings": [{"uuid": "098da48e-d0cb-427d-9a1d-e83947b4f7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26248", "type": "seen", "source": "https://t.me/cvedetector/8952", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-26248 - IPFS go-libp2p-kad-dht Sybil Attack\", \n  \"Content\": \"CVE ID : CVE-2023-26248 \nPublished : Oct. 25, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T18:45:23.000000Z"}]}