CVE-2018-1000023:
Insight API transaction broadcast endpoint can result in Full Path Disclosure
5.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4607%
CWE
Published
3/5/2018
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
insight-api | npm | <= 5.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the transaction broadcast flow starting from TxController.send
(HTTP endpoint handler). The stack traces in disclosed errors explicitly show: 1) TxController.send
at transactions.js
:303 calling into 2) Bitcoin.sendTransaction
at bitcoind.js
:1806, which interacts with bitcoind-rpc. Both functions fail to validate()
input properly before processing, allowing attackers to trigger path-disclosing errors through malformed 'rawtx' parameters. The direct correlation between the attack vector (web request to /tx/send
) and these functions' error handling makes them clearly vulnerable.