Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/hyperledger/fabric
  4. ›
  5. CVE-2023-46132

CVE-2023-46132: Improper Neutralization

November 14, 2023

Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called “cross-linking” results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a “cross-linked block” (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

  • github.com/advisories/GHSA-v9w2-543f-h69m
  • github.com/hyperledger/fabric/commit/389b2e66de9a6fbc6043216d554c97bbbdf0e008
  • github.com/hyperledger/fabric/commit/93bef10bd3ce3c54d7f3b064f765dbde61da7def
  • github.com/hyperledger/fabric/pull/4503
  • github.com/hyperledger/fabric/pull/4504
  • github.com/hyperledger/fabric/releases/tag/v2.2.14
  • github.com/hyperledger/fabric/releases/tag/v2.5.5
  • github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m
  • nvd.nist.gov/vuln/detail/CVE-2023-46132

Code Behaviors & Features

Detect and mitigate CVE-2023-46132 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.0.0-alpha before 2.2.14, all versions starting from 2.3.0 before 2.5.5

Fixed versions

  • 2.2.14
  • 2.5.5

Solution

Upgrade to versions 2.2.14, 2.5.5 or above.

Weakness

  • CWE-707: Improper Neutralization

Source file

go/github.com/hyperledger/fabric/CVE-2023-46132.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:51 +0000.