Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21369
HistoryMar 09, 2021 - 6:10 p.m.

CVE-2021-21369 Potential DoS in Besu HTTP JSON-RPC API

2021-03-0918:10:18
CWE-400
GitHub_M
www.cve.org
1
hyperledger besu
denial of service
http json-rpc api
authentication
json web token
mainnet
ethereum
vertx event loop
vulnerability
fixed
version 1.5.1

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

44.3%

Hyperledger Besu is an open-source, MainNet compatible, Ethereum client written in Java. In Besu before version 1.5.1 there is a denial-of-service vulnerability involving the HTTP JSON-RPC API service. If username and password authentication is enabled for the HTTP JSON-RPC API service, then prior to making any requests to an API endpoint the requestor must use the login endpoint to obtain a JSON web token (JWT) using their credentials. A single user can readily overload the login endpoint with invalid requests (incorrect password). As the supplied password is checked for validity on the main vertx event loop and takes a relatively long time this can cause the processing of other valid requests to fail. A valid username is required for this vulnerability to be exposed. This has been fixed in version 1.5.1.

CNA Affected

[
  {
    "product": "besu",
    "vendor": "hyperledger",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.5.1"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

44.3%

Related for CVELIST:CVE-2021-21369