GHSA-pvjg-jwp3-mrj5

Suggest an improvement
Source
https://github.com/advisories/GHSA-pvjg-jwp3-mrj5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-pvjg-jwp3-mrj5/GHSA-pvjg-jwp3-mrj5.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-pvjg-jwp3-mrj5
Aliases
Published
2022-07-30T00:00:16Z
Modified
2024-12-02T05:44:22.393065Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
chia-blockchain tokens can be inflated to an arbitrary extent
Details

An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted tokens minted on the Chia blockchain using the CAT1 standard can be inflated to an arbitrary extent by any holder of any amount of the token. The total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chia blockchain regardless of issuance rules. This attack is auditable on chain, so maliciously altered coins can potentially be marked by off-chain observers as malicious.

Database specific
{
    "nvd_published_at": "2022-07-29T21:15:00Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-21T22:17:15Z"
}
References

Affected packages

PyPI / chia-blockchain

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.4.4rc3

Affected versions

0.*

0.1

1.*

1.0b1
1.0b2
1.0b3
1.0b4
1.0b5
1.0b6
1.0b7
1.0b8
1.0b9
1.0b10
1.0b11
1.0b12.dev117
1.0b12
1.0b13
1.0b14
1.0b15
1.0b16
1.0b17
1.0b18
1.0b19
1.0b20
1.0b21
1.0b22
1.0b23
1.0b26
1.0b27
1.0rc1
1.0rc2
1.0rc3
1.0rc4
1.0rc5
1.0rc6
1.0rc7
1.0rc8
1.0rc9
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.11
1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4.0
1.5.0
1.5.1
1.6.0
1.6.1rc1
1.6.1rc3
1.6.1rc4
1.6.1rc5
1.6.1rc6
1.6.1
1.6.2rc1
1.6.2
1.7.0b1
1.7.0b2
1.7.0b3
1.7.0b4
1.7.0b5
1.7.0b6
1.7.0rc1
1.7.0rc2
1.7.0rc3
1.7.0rc4
1.7.0rc5
1.7.0rc6
1.7.0rc7
1.7.0rc8
1.7.0rc9
1.7.0
1.7.1rc1
1.7.1rc2
1.7.1rc3
1.7.1
1.8.0b1
1.8.0b2
1.8.0b3
1.8.0b4
1.8.0b5
1.8.0b6
1.8.0rc1
1.8.0rc2
1.8.0rc3
1.8.0rc4
1.8.0rc5
1.8.0
1.8.1rc1
1.8.1rc2
1.8.1rc3
1.8.1rc4
1.8.1
1.8.2rc1
1.8.2rc3
1.8.2rc4
1.8.2rc5
1.8.2rc6
1.8.2
1.8.3rc1

2.*

2.0.0b1
2.0.0b3
2.0.0b4
2.0.0b5
2.0.0rc1
2.0.0rc2
2.0.0rc3
2.0.0rc4
2.0.0rc5
2.0.0rc6
2.0.0
2.0.1b1
2.0.1b2
2.0.1rc1
2.0.1
2.1.0rc1
2.1.0rc2
2.1.0rc3
2.1.0rc4
2.1.0rc5
2.1.0
2.1.1rc1
2.1.1
2.1.2rc1
2.1.2rc2
2.1.2rc3
2.1.2rc4
2.1.2
2.1.3rc1
2.1.3
2.1.4rc1
2.1.4rc2
2.1.4
2.2.0rc1
2.2.0rc2
2.2.0rc3
2.2.0rc4
2.2.0
2.2.1
2.3.0rc1
2.3.0rc2
2.3.0rc3
2.3.0rc4
2.3.0
2.3.1rc1
2.3.1
2.4.0rc1
2.4.0rc2
2.4.0rc3
2.4.0
2.4.1rc1
2.4.2
2.4.3b1
2.4.3b2
2.4.3rc1
2.4.3rc2
2.4.3rc3
2.4.3
2.4.4rc1
2.4.4rc2
2.4.4rc3