Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jcqq-g64v-gcm7

Опубликовано: 10 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 8.2

Описание

Previous ATX is not checked to be the newest valid ATX by Smesher when validating incoming ATX

Impact

Nodes can publish ATXs which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards.

Patches

  • API needs to be extended to be able to fetch events from a node that dected malicious behavior of this regard by the node
  • go-spacemesh needs to be patched to a) not allow publishing these ATXs any more and b) create malfeasance proofs for identities that published invalid ATXs in the past.

Workarounds

n/a

References

Spacemesh protocol whitepaper: https://spacemesh.io/blog/spacemesh-white-paper-1/, specifically sections 4.4.2 ("ATX Contents") and 4.4.3 ("ATX validity")

Пакеты

Наименование

github.com/spacemeshos/go-spacemesh

go
Затронутые версииВерсия исправления

< 1.5.2-hotfix1

1.5.2-hotfix1

Наименование

github.com/spacemeshos/api

go
Затронутые версииВерсия исправления

< 1.37.1

1.37.1

EPSS

Процентиль: 27%
0.00094
Низкий

8.2 High

CVSS3

Дефекты

CWE-754

Связанные уязвимости

CVSS3: 8.2
nvd
больше 1 года назад

go-spacemesh is a Go implementation of the Spacemesh protocol full node. Nodes can publish activations transactions (ATXs) which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards. This vulnerability is fixed in go-spacemesh 1.5.2-hotfix1 and Spacemesh API 1.37.1.

EPSS

Процентиль: 27%
0.00094
Низкий

8.2 High

CVSS3

Дефекты

CWE-754