Always-Incorrect Control Flow Implementation Affecting @solana/pay package, versions <0.2.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-SOLANAPAY-2964940
  • published 2 Aug 2022
  • disclosed 2 Aug 2022
  • credit cmowenby

How to fix?

Upgrade @solana/pay to version 0.2.1 or higher.

Overview

@solana/pay is a @solana/pay is a JavaScript library for facilitating commerce on Solana by using a token transfer URL scheme. The URL scheme ensures that no matter the wallet or service used, the payment request must be created and interpreted in one standard way.

Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation via the validateTransfer function, due to an edge case causing the validation logic to validate multiple payment transfers.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.9 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

NVD

5.3 medium