Miggo Logo

GHSA-r3r4-g7hq-pq4f: CometBFT allows a malicious peer to stall the network by disseminating seemingly valid block parts

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
2/3/2025
Updated
2/5/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cometbft/cometbftgo>= 1.0.0-alpha.1, < 1.0.11.0.1
github.com/cometbft/cometbftgo< 0.38.170.38.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing validation between Part.Index and Proof.Index. The primary fix was adding this check in types.Part.ValidateBasic (as shown in the commit diff). The Go vulnerability report explicitly lists ValidateBasic and PartFromProto as affected symbols. While ValidateBasic is directly responsible for the missing check, PartFromProto's medium confidence stems from its dependency on ValidateBasic for validation during deserialization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

N*m*: *S*-****-***: M*li*ious p**r **n st*ll n*twork *y *iss*min*tin* s**min*ly v*li* *lo*k p*rts *ompon*nt: *om*t**T *riti**lity: *i** (**t*strop*i* Imp**t; Possi*l* Lik*li*oo* p*r [**Mv*.*](*ttps://*it*u*.*om/int*r***inio/s**urity/*lo*/m*in/r*sour*

Reasoning

T** vuln*r**ility st*mm** *rom missin* `v*li**tion` **tw**n `P*rt.In**x` *n* `Proo*.In**x`. T** prim*ry *ix w*s ***in* t*is ****k in `typ*s.P*rt.V*li**t***si*` (*s s*own in t** *ommit *i**). T** *o vuln*r**ility r*port *xpli*itly lists `V*li**t***si*