Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tOTljLXEyNnItbTdtN84AA7I6

Evmos vulnerable to unauthorized account creation with vesting module

Impact

What kind of vulnerability is it? Who is impacted?

Using the vesting module, a malicious attacker can create a new vesting account at a given
address, before a contract is created on that address.

Addresses of smart contracts deployed to the EVM are deterministic. Therefore, it would be possible for an attacker to front-run a contract creation and create a vesting account at that address.
When an address has been initialized without any contract code deployed to it, it will not be possible to upload any afterwards. In the described attack, this would mean that a malicious actor could prevent smart contracts from being deployed correctly.

In order to remediate this, an alternative user flow is being implemented for the vesting module:

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

References

Are there any links users can visit to find out more?

Permalink: https://github.com/advisories/GHSA-m99c-q26r-m7m7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tOTljLXEyNnItbTdtN84AA7I6
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 16 days ago
Updated: 16 days ago


Identifiers: GHSA-m99c-q26r-m7m7
References: Repository: https://github.com/evmos/evmos
Blast Radius: 1.0

Affected Packages

go:github.com/evmos/evmos/v13
Dependent packages: 6
Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 13.0.2
No known fixed version
All affected versions: 13.0.0, 13.0.1, 13.0.2
go:github.com/evmos/evmos/v13/x/vesting
Affected Version Ranges: <= 13.0.2
No known fixed version