Miggo Logo

GHSA-v6rw-hhgg-wc4x:
Evmos vulnerable to DOS and transaction fee expropiation through Authz exploit

9.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
4/17/2024
Updated
4/17/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/evmos/evmos/v11go< 12.0.012.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key gaps: 1) The authz module's MsgExec handler (authz.NewMsgExec) didn't recursively validate() nested MsgEthereumTx messages, and 2) The Ethereum-specific AnteHandler (newEthAnteHandler) wasn't applied to these nested messages. This allowed attackers to embed gas-unchecked EVM transactions. The fix explicitly adds recursive checks and a decorator (AuthzLimiterDecorator) to the AnteHandler chain, confirming these were the missing protections.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ *n *tt**k*r **n us* t*is *u* to *yp*ss t** *lo*k **s limit *n* **s p*ym*nt *ompl*t*ly to p*r*orm * *ull **ni*l-o*-S*rvi** ***inst t** ***in. ## *is*losur* *vmos v*rsions **low `v**.*.*

Reasoning

T** vuln*r**ility st*ms *rom two k*y **ps: *) T** *ut*z mo*ul*'s `Ms**x**` **n*l*r (`*ut*z.N*wMs**x**`) *i*n't r**ursiv*ly `v*li**t*()` n*st** `Ms**t**r*umTx` m*ss***s, *n* *) T** *t**r*um-sp**i*i* `*nt***n*l*r` (`n*w*t**nt***n*l*r`) w*sn't *ppli** t