logo

CVE-2020-10937 github.com/ipfs/go-ipfs

Package

Manager: go
Name: github.com/ipfs/go-ipfs
Vulnerable Version: >=0 <0.7.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00536 pctl0.66531

Details

Access Restriction Bypass in go-ipfs An issue was discovered in IPFS (aka go-ipfs) 0.4.23. An attacker can generate ephemeral identities (Sybils) and leverage the IPFS connection management reputation system to poison other nodes' routing tables, eclipsing the nodes that are the target of the attack from the rest of the network. Later versions, in particular go-ipfs 0.7, mitigate this.

Metadata

Created: 2024-04-24T20:01:46Z
Modified: 2024-04-24T20:01:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r23h-3jmw-q7hr/GHSA-r23h-3jmw-q7hr.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-r23h-3jmw-q7hr
Finding: F039
Auto approve: 1