CVE-2022-31020
Remote code execution in Indy's NODE_UPGRADE transaction
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In versions 1.12.4 and prior, the `pool-upgrade` request handler in Indy-Node allows an improperly authenticated attacker to remotely execute code on nodes within the network. The `pool-upgrade` request handler in Indy-Node 1.12.5 has been updated to properly authenticate pool-upgrade transactions before any processing is performed by the request handler. The transactions are further sanitized to prevent remote code execution. As a workaround, endorsers should not create DIDs for untrusted users. A vulnerable ledger should configure `auth_rules` to prevent new DIDs from being written to the ledger until the network can be upgraded.
Indy Node es la parte del servidor de un libro mayor distribuido construido para la identidad descentralizada. En versiones 1.12.4 y anteriores, el administrador de peticiones "pool-upgrade" de Indy-Node permite a un atacante autenticado ejecutar código de forma remota en nodos de la red. El administrador de peticiones "pool-upgrade" en Indy-Node versión 1.12.5, ha sido actualizado para autenticar apropiadamente las transacciones de pool-upgrade antes de que el administrador de peticiones las lleve a cabo. Las transacciones son saneadas además para evitar una ejecución de código remota. Como mitigación, los endosantes no deberían crear DIDs para usuarios no confiables. Un libro mayor vulnerable debería configurar "auth_rules" para evitar que sean escritos nuevos DID en el libro mayor hasta que la red pueda ser actualizada.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-18 CVE Reserved
- 2022-09-06 CVE Published
- 2024-06-25 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-287: Improper Authentication
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/hyperledger/indy-node/releases/tag/v1.12.5 | Release Notes | |
https://github.com/hyperledger/indy-node/security/advisories/GHSA-r6v9-p59m-gj2p | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/hyperledger/indy-node/commit/fe507474f77084faef4539101e2bbb4d508a97f5 | 2022-09-13 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Indy-node Search vendor "Linuxfoundation" for product "Indy-node" | <= 1.12.4 Search vendor "Linuxfoundation" for product "Indy-node" and version " <= 1.12.4" | - |
Affected
|