Lucene search

K
osvGoogleOSV:GHSA-HG58-RF2H-6RR7
HistoryJun 28, 2024 - 2:33 p.m.

CometBFT is unstability during blocksync when syncing from malicious peer

2024-06-2814:33:33
Google
osv.dev
1
cometbft
blocksynchronization
malicious peer
denial of service
network vulnerability

6.7 Medium

AI Score

Confidence

High

Name: ASA-2024-008: Instability during blocksync when syncing from malicious peerComponent: CometBFTCriticality: Medium (ACMv1: I:Moderate; L: Possible)Affected versions: < v0.38.7

Summary

An issue was identified for nodes syncing on an existing network during blocksync in which a malicious peer could cause the syncing peer to panic, enter into a catastrophic invalid syncing state or get stuck in blocksync mode, never switching to consensus. It is recommended for all clients to adopt this patch so that blocksync functions as expected and is tolerant of malicious peers presenting invalid data in this situation. Nodes that are vulnerable to this state may experience a Denial of Service condition in which syncing will not work as expected when joining a network as a client.

Recognition

This issue was reported to the Cosmos Bug Bounty Program on HackerOne on 5/01/24 by unknown_feature. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.

If you have questions about Interchain security efforts, please reach out to our official communication channel at [email protected].

For more information about CometBFT, please see https://docs.cometbft.com/.

For more information about the Interchain Foundationโ€™s engagement with Amulet, please see https://github.com/interchainio/security.

6.7 Medium

AI Score

Confidence

High