Miggo Logo

CVE-2023-38698:
.eth registrar controller can shorten the duration of registered names

4.9

CVSS Score

Basic Information

EPSS Score
-
Published
8/1/2023
Updated
11/12/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@ensdomains/ens-contractsnpm<= 0.0.210.0.22

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the renew function's flawed overflow check. The require statement intended to prevent future overflow is ineffective because both operands of the comparison can overflow when a malicious duration is provided. This allows an attacker-controlled controller to manipulate expiration times. The code analysis shows direct user control over the duration parameter and arithmetic operations vulnerable to overflow, making this function the clear entry point for the exploit.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription ***or*in* to t** *o*um*nt*tion, *ontroll*rs *r* *llow** to r**ist*r n*w *om*ins *n* *xt*n* t** *xpiry o* *xistin* *om*ins, *ut t**y **nnot ***n** t** own*rs*ip or r**u** t** *xpir*tion tim* o* *xistin* *om*ins. *ow*v*r, * pr*limin*ry

Reasoning

T** vuln*r**ility st*ms *rom t** `r*n*w` *un*tion's *l*w** ov*r*low ****k. T** r*quir* st*t*m*nt int*n*** to pr*v*nt *utur* ov*r*low is in*****tiv* ****us* *ot* op*r*n*s o* t** *omp*rison **n ov*r*low w**n * m*li*ious `*ur*tion` is provi***. T*is *ll