Miggo Logo

CVE-2024-39696: Evmos vulnerable to exploit of smart contract account and vesting

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.30022%
Published
7/10/2024
Updated
8/9/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/evmos/evmos/v18go<= 18.0.119.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper authorization checks in the fundVestingAccount function. The original implementation validated the contract caller's authorization but used the message-specified funder address for actual fund transfers. This mismatch allowed attackers to create vesting accounts with arbitrary funders without proper authorization. The patch added critical validation that restricts the funder to either the transaction origin (EOA) or the contract caller when invoked through a smart contract, addressing the improper authorization (CWE-863).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T*is **visory *o*r* *ims to **s*ri** two vuln*r**iliti*s *oun* in t** *vmos *o****s*: - _*ut*oriz*tion ****k on t** *un*V*stin****ount_: un*ut*oriz** sp*n* o* *un*s. ### **t*ils #### *ut*oriz*tion ****k on t** *un*V*stin****ount Wit*

Reasoning

T** vuln*r**ility st*mm** *rom improp*r *ut*oriz*tion ****ks in t** `*un*V*stin****ount` *un*tion. T** ori*in*l impl*m*nt*tion v*li**t** t** *ontr**t **ll*r's *ut*oriz*tion *ut us** t** m*ss***-sp**i*i** *un**r ***r*ss *or **tu*l *un* tr*ns**rs. T*is