Improper Authorization Affecting github.com/evmos/evmos/v18/precompiles/vesting package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMEVMOSEVMOSV18PRECOMPILESVESTING-7430232
  • published 8 Jul 2024
  • disclosed 5 Jul 2024
  • credit GAtom22

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Improper Authorization due to the misuse of the contract.CallerAddress authorization check in the code, which does not verify the source of the funds. An attacker can drain funds from any account on the chain by creating a vesting account funded by a third-party account without the third party's permission. This is only exploitable if the attacker can create a vesting account and an authorization for a contract.CallerAddress.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
7.7 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None