Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-35917
HistoryAug 01, 2022 - 9:10 p.m.

CVE-2022-35917 Weakness in Transfer Validation Logic in @solana/pay

2022-08-0121:10:11
CWE-670
GitHub_M
www.cve.org
2
solana pay
transfer validation
patched vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

33.8%

Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied validateTransfer function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. This issue has been patched as of version 0.2.1. Users of the Solana Pay SDK should upgrade to it. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "solana-pay",
    "vendor": "solana-labs",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.2.1"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

33.8%

Related for CVELIST:CVE-2022-35917