ghsa-5jgq-x857-p8xw
Vulnerability from github
Impact
What kind of vulnerability is it? Who is impacted?
Classification
The vulnerability has been classified as critical
with a score of 9.0
(highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.
Disclosure
The attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK AnteHandler
, and the Evmos x/claims
module. The step-by-step attack is described below:
- An actor creates a malicious chain with a custom
AnteHandler
that skips signature verification for transactions, specifically IBCMsgTransfer
. This allows the attacker to impersonate any account by setting a customsender
address field of the IBC transfer message. - The malicious actor then connects this newly created chain via IBC to Evmos and fills the
recipient
address from the transfer message with an address they control. - Once the IBC packet containing the Transfer data is relayed to Evmos, it is processed by the claims module IBC middleware. Which migrates the claim records to the recipient address, which is owned by the attacker.
- The attacker then performs two airdrop Actions, claiming up to 75% of the total initial claimable amount.
- The Actor repeats steps 1., 2., and 3. for every address that has unclaimed funds from the airdrop. This automatically claims 75% of the unclaimable amount.
- The malicious actor performs the final Action, claiming 100% of all the user funds.
- Then, the attacker transfers the funds to another chain with a DEX (Osmosis, Cosmos Hub) via IBC.
- Finally, the attacker withdraws the total amount in fiat through a centralized exchange.
Users impacted
No users have suffered the loss of funds as no malicious chains have been connected to Evmos.
Patches
Has the problem been patched? What versions should users upgrade to?
The patch involves defining a list of authorized channels for chains that are connected to Evmos via IBC. This restricts the chains that have the capability of migrating users' claims records as per the specification. By default, the authorized destination channels are "channel-0"
(Osmosis) and "channel-3"
(Cosmos Hub).
Please upgrade your mainnet node and validator to v2.0.1
ASAP.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, the fix for the critical vulnerability is state machine breaking. An upgrade procedure must be coordinated with the nodes running the network.
References
Are there any links users can visit to find out more?
- Claims module spec: evmos.dev/modules/claims
- Cosmos SDK documentation: docs.cosmos.network
- IBC documentation: ibc.cosmos.network
For more information
If you have any questions or comments about this advisory:
- Reach out to the Core Team in Discord
- Open an issue in tharsis/evmos
- Email us at security@thars.is
Thanks to the Core IBC team at Interchain GmbH for the secure disclosure of this vulnerability
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/tharsis/evmos" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-24738" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": true, "github_reviewed_at": "2022-03-07T21:45:59Z", "nvd_published_at": "2022-03-07T22:15:00Z", "severity": "HIGH" }, "details": "## Impact\n_What kind of vulnerability is it? Who is impacted?_\n\n### Classification\n\nThe vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.\n\n### Disclosure\n\nThe attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK `AnteHandler`, and the Evmos `x/claims` module. The step-by-step attack is described below:\n\n1. An actor creates a malicious chain with a custom `AnteHandler` that skips signature verification for transactions, specifically IBC `MsgTransfer`. This allows the attacker to impersonate any account by setting a custom `sender` address field of the IBC transfer message.\n2. The malicious actor then connects this newly created chain via IBC to Evmos and fills the `recipient` address from the transfer message with an address they control.\n3. Once the IBC packet containing the Transfer data is relayed to Evmos, it is processed by the claims module IBC middleware. Which migrates the claim records to the recipient address, which is owned by the attacker.\n4. The attacker then performs two airdrop Actions, claiming up to 75% of the total initial claimable amount.\n5. The Actor repeats steps 1., 2., and 3. for every address that has unclaimed funds from the airdrop. This automatically claims 75% of the unclaimable amount.\n6. The malicious actor performs the final Action, claiming 100% of all the user funds.\n7. Then, the attacker transfers the funds to another chain with a DEX (Osmosis, Cosmos Hub) via IBC. \n8. Finally, the attacker withdraws the total amount in fiat through a centralized exchange. \n\n### Users impacted\n\nNo users have suffered the loss of funds as no malicious chains have been connected to Evmos.\n\n## Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\nThe patch involves defining a list of authorized channels for chains that are connected to Evmos via IBC. This restricts the chains that have the capability of migrating users\u0027 claims records as per the specification. By default, the authorized destination channels are `\"channel-0\"` (Osmosis) and `\"channel-3\"` (Cosmos Hub).\n\nPlease upgrade your mainnet node and validator to [`v2.0.1`](https://github.com/tharsis/evmos/releases/tag/v2.0.1) **ASAP**.\n\n## Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nNo, the fix for the critical vulnerability is state machine breaking. An upgrade procedure must be coordinated with the nodes running the network.\n\n## References\n\n_Are there any links users can visit to find out more?_\n\n* Claims module spec: [evmos.dev/modules/claims](https://evmos.dev/modules/claims)\n* Cosmos SDK documentation: [docs.cosmos.network](https://docs.cosmos.network/)\n* IBC documentation: [ibc.cosmos.network](https://ibc.cosmos.network/)\n\n## For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to the Core Team in [Discord](https://discord.gg/evmos)\n* Open an issue in [tharsis/evmos](http://github.com/tharsis/evmos/issues)\n* Email us at [security@thars.is](security@thars.is)\n\nThanks to the Core IBC team at Interchain GmbH for the secure disclosure of this vulnerability", "id": "GHSA-5jgq-x857-p8xw", "modified": "2022-03-18T20:07:34Z", "published": "2022-03-07T21:45:59Z", "references": [ { "type": "WEB", "url": "https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24738" }, { "type": "WEB", "url": "https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71" }, { "type": "PACKAGE", "url": "https://github.com/tharsis/evmos" }, { "type": "WEB", "url": "https://github.com/tharsis/evmos/releases/tag/v2.0.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Account compromise in Evmos" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.