Miggo Logo

CVE-2023-35163: Vega's validators able to submit duplicate transactions

6

CVSS Score
3.1

Basic Information

EPSS Score
0.17407%
Published
6/20/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
code.vegaprotocol.io/vegago< 0.71.60.71.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from using txId for duplication checks while omitting transaction hash (txHash) from the actual on-chain event validation. The patch added txHash parameters and checks to multiple validation functions across banking, staking, and multisig components. The vulnerable functions are those whose method signatures and validation logic were modified to include txHash in the security advisory commit, indicating they previously lacked this critical validation step. High confidence comes from direct correlation between the vulnerability description (txId bypass) and the patched validation logic changes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility *xists t**t *llows * m*li*ious v*li**tor to tri*k t** V*** n*twork into r*-pro**ssin* p*st *t**r*um *v*nts *rom V***’s *t**r*um *ri***. *or *x*mpl*, * **posit to t** *oll*t*r*l *ri*** *or ***US*T t**t *r**its * p*rty’s **n*r*l ***ount

Reasoning

T** vuln*r**ility st*mm** *rom usin* txI* *or *upli**tion ****ks w*il* omittin* tr*ns**tion **s* (tx**s*) *rom t** **tu*l on-***in *v*nt v*li**tion. T** p*t** ***** tx**s* p*r*m*t*rs *n* ****ks to multipl* v*li**tion *un*tions **ross **nkin*, st*kin*