Skip to content

Deserialization of Untrusted Data in EthereumJ

Critical severity GitHub Reviewed Published Jul 26, 2019 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

maven org.ethereum:ethereumj-core (Maven)

Affected versions

<= 1.12.0

Patched versions

None

Description

An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.

References

Published by the National Vulnerability Database Jun 20, 2019
Reviewed Jul 26, 2019
Published to the GitHub Advisory Database Jul 26, 2019
Last updated Feb 1, 2023

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-15890

GHSA ID

GHSA-hf4p-jm7r-vjjj

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.