Miggo Logo

GHSA-5v93-9mqw-p9mh: Uncaught Panic in ORML Rewards Pallet

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
2/14/2025
Updated
2/14/2025
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
orml-rewardsrust< 1.2.11.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies add_share as the entry point. The commit diff shows critical changes in lib.rs where unsafe .as_u128() casts were replaced with .saturated_into::<u128>() to handle overflows. These operations occur in reward calculation logic that processes user-controlled add_amount values. The patch confirms the vulnerable pattern was present in arithmetic operations preceding validation checks, making this function the root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Summ*ry * vuln*r**ility in t** `***_s**r*` *un*tion o* t** **R*w*r*s** p*ll*t (p*rt o* t** ORML r*pository) **n l*** to *n un**u**t Rust p*ni* w**n **n*lin* us*r-provi*** input *x****in* t** `u***` r*n**. ## *****t** *ompon*nts - **ORML R*w*r*s**

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s `***_s**r*` *s t** *ntry point. T** *ommit *i** s*ows *riti**l ***n**s in `li*.rs` w**r* uns*** `.*s_u***()` **sts w*r* r*pl**** wit* `.s*tur*t**_into::<u***>()` to **n*l* ov*r*lows. T**s* op*r*tion