Improper Authorization Affecting github.com/evmos/evmos/v18/precompiles/vesting package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMEVMOSEVMOSV18PRECOMPILESVESTING-7430232
  • published8 Jul 2024
  • disclosed5 Jul 2024
  • creditGAtom22

Introduced: 5 Jul 2024

CVE-2024-39696  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Improper Authorization due to the misuse of the contract.CallerAddress authorization check in the code, which does not verify the source of the funds. An attacker can drain funds from any account on the chain by creating a vesting account funded by a third-party account without the third party's permission. This is only exploitable if the attacker can create a vesting account and an authorization for a contract.CallerAddress.

References

CVSS Scores

version 4.0
version 3.1