Lucene search

K
osvGoogleOSV:GHSA-J47C-J42C-MWQQ
HistoryAug 06, 2022 - 5:39 a.m.

Solana Pay Vulnerable to Weakness in Transfer Validation Logic

2022-08-0605:39:18
Google
osv.dev
5
solana pay
vulnerable
transfer validation
point of sale
web-based applications
patched
sdk upgrade

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

33.8%

Description

When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied validateTransfer function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers.

Impact

Most known Solana Pay point of sale applications are currently run on physical point of sale devices, which makes this issue unlikely to occur. However, there may be web-based point of sale applications using the protocol where it may be more likely to occur.

Patches

This issue has been patched as of version 0.2.1. Users of the Solana Pay SDK should upgrade to it.

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

33.8%

Related for OSV:GHSA-J47C-J42C-MWQQ