In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value.
This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.
{
"review_status": "REVIEWED",
"url": "https://pkg.go.dev/vuln/GO-2022-1117"
}{
"imports": [
{
"symbols": [
"defaultAuditor.Run",
"defaultAuditor.audit"
],
"path": "github.com/codenotary/immudb/pkg/client/auditor"
},
{
"symbols": [
"immuClient.SafeGet",
"immuClient.SafeReference",
"immuClient.SafeSet",
"immuClient.SafeZAdd",
"immuClient.StreamVerifiedGet",
"immuClient.StreamVerifiedSet",
"immuClient.VerifiedGet",
"immuClient.VerifiedGetAt",
"immuClient.VerifiedGetAtRevision",
"immuClient.VerifiedGetSince",
"immuClient.VerifiedSet",
"immuClient.VerifiedSetReference",
"immuClient.VerifiedSetReferenceAt",
"immuClient.VerifiedTxByID",
"immuClient.VerifiedZAdd",
"immuClient.VerifiedZAddAt",
"immuClient.VerifyRow",
"immuClient._streamVerifiedGet",
"immuClient._streamVerifiedSet",
"immuClient.verifiedGet"
],
"path": "github.com/codenotary/immudb/pkg/client"
},
{
"symbols": [
"ImmuStore.DualProof",
"VerifyDualProof",
"VerifyLinearProof"
],
"path": "github.com/codenotary/immudb/embedded/store"
}
]
}