Authentication Bypass Using an Alternate Path or Channel Affecting github.com/tharsis/evmos package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.3% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMTHARSISEVMOS-2419119
  • published8 Mar 2022
  • disclosed8 Mar 2022
  • creditColin Axnér, Damian Nolan

Introduced: 8 Mar 2022

CVE-2022-24738  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

github.com/tharsis/evmos is a scalable, high-throughput Proof-of-Stake blockchain that is fully compatible and interoperable with Ethereum. It's built using the Cosmos SDK which runs on top of Tendermint Core consensus engine.

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel. Attackers are able to drain unclaimed funds from user addresses. To do this, an attacker must create a new chain that does not enforce signature verification and connects it to the target Evmos instance, then the attacker can use this joined chain to transfer unclaimed funds.

Note: The attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK AnteHandler, and the Evmos x/claims module

CVSS Scores

version 3.1