Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-35917
HistoryAug 01, 2022 - 9:10 p.m.

CVE-2022-35917 Weakness in Transfer Validation Logic in @solana/pay

2022-08-0121:10:11
CWE-670
GitHub_M
www.cve.org

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

33.8%

Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied validateTransfer function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. This issue has been patched as of version 0.2.1. Users of the Solana Pay SDK should upgrade to it. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "solana-pay",
    "vendor": "solana-labs",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.2.1"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

33.8%

Related for CVELIST:CVE-2022-35917