CVE-2021-41138 – pallet-ethereum
Package
Manager: cargo
Name: pallet-ethereum
Vulnerable Version: >=0 <=3.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00575 pctl0.67798
Details
Validity check missing in Frontier ### Impact In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors. ### Patches The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba. ### References Patch PR: https://github.com/paritytech/frontier/pull/495 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues) ### Special thanks Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability.
Metadata
Created: 2021-10-13T18:53:38Z
Modified: 2024-10-24T21:53:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-vj62-g63v-f8mf/GHSA-vj62-g63v-f8mf.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-vj62-g63v-f8mf
Finding: F184
Auto approve: 1