GHSA-7mm3-vfg8-7rg6

Suggest an improvement
Source
https://github.com/advisories/GHSA-7mm3-vfg8-7rg6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7mm3-vfg8-7rg6
Aliases
Published
2025-05-15T14:05:32Z
Modified
2025-05-15T20:42:09.571272Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N CVSS Calculator
Summary
Babylon Finality Provider `MsgCommitPubRandList` replay attack
Details

Summary

A high vulnerability exists in the Babylon protocol's x/finality module due to a lack of domain separation in signed messages, combined with insufficient validation in the MsgCommitPubRandList handler. Specifically, the handler does not enforce that the submitted Commitment field is 32 bytes long. This allows an attacker to replay a signature originally generated for a different message (e.g., a Proof-of-Possession in MsgCreateFinalityProvider) as a MsgCommitPubRandList. By crafting the message parameters, an attacker can use the typically 20-byte address bytes (from the PoP context) to form the StartHeight, NumPubRand, and a shorter-than-expected Commitment (e.g., 4 bytes). The replayed signature will pass verification for this crafted message, leading to the injection of an invalid PubRand commitment.

Impact

Successful exploitation of this vulnerability, specifically via the PoP signature replay, allows an attacker to store an invalid PubRand commitment (with a non-standard length, e.g., 4 bytes) for a targeted Finality Provider (FP). Despite the commitment itself being malformed, it's the associated StartHeight and NumPubRand (derived from the replayed address bytes and typically very large) that cause severe consequences

Future recommendations

To minimize future risk of such attacks, all finality providers should: 1. Never re-use your finality provider EOTS across the networks (e.g., the testnet) or for any other purpose. 2. Never use EOTS keys to sign any other data than relevant to in-protocol messages. Ideally EOTS key should only be used to: - Sign initial proof of possession message - Sign periodic randomness commits - Sign finality votes with every block

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-290"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-15T14:05:32Z"
}
References

Affected packages

Go / github.com/babylonlabs-io/babylon

Package

Name
github.com/babylonlabs-io/babylon
View open source insights on deps.dev
Purl
pkg:golang/github.com/babylonlabs-io/babylon

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.2