vipinsun / fabric-token-sdk

The Fabric Token SDK is a set of API and services that lets developers create token-based distributed application on Hyperledger Fabric.
Apache License 2.0
1 stars 0 forks source link

CVE-2023-46132 (High) detected in github.com/hyperledger/fabric-v1.4.0-rc1.0.20210722174351-9815a7a8f0f7 #65

Open mend-bolt-for-github[bot] opened 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2023-46132 - High Severity Vulnerability

Vulnerable Library - github.com/hyperledger/fabric-v1.4.0-rc1.0.20210722174351-9815a7a8f0f7

Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. Its modular and versatile design satisfies a broad range of industry use cases.

Library home page: https://proxy.golang.org/github.com/hyperledger/fabric/@v/v1.4.0-rc1.0.20210722174351-9815a7a8f0f7.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Dependency Hierarchy: - :x: **github.com/hyperledger/fabric-v1.4.0-rc1.0.20210722174351-9815a7a8f0f7** (Vulnerable Library)

Found in HEAD commit: 999f5d255a183e22a067e6411929924a0bacd65f

Found in base branch: main

Vulnerability Details

Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called "cross-linking" results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a "cross-linked block" (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2023-11-14

URL: CVE-2023-46132

CVSS 3 Score Details (7.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m

Release Date: 2023-11-14

Fix Resolution: v2.2.14,v2.5.5


Step up your Open Source Security Game with Mend here