In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value.
This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2022-1117" }
{ "imports": [ { "path": "github.com/codenotary/immudb/pkg/client/auditor", "symbols": [ "defaultAuditor.Run", "defaultAuditor.audit" ] }, { "path": "github.com/codenotary/immudb/pkg/client", "symbols": [ "immuClient.SafeGet", "immuClient.SafeReference", "immuClient.SafeSet", "immuClient.SafeZAdd", "immuClient.StreamVerifiedGet", "immuClient.StreamVerifiedSet", "immuClient.VerifiedGet", "immuClient.VerifiedGetAt", "immuClient.VerifiedGetAtRevision", "immuClient.VerifiedGetSince", "immuClient.VerifiedSet", "immuClient.VerifiedSetReference", "immuClient.VerifiedSetReferenceAt", "immuClient.VerifiedTxByID", "immuClient.VerifiedZAdd", "immuClient.VerifiedZAddAt", "immuClient.VerifyRow", "immuClient._streamVerifiedGet", "immuClient._streamVerifiedSet", "immuClient.verifiedGet" ] }, { "path": "github.com/codenotary/immudb/embedded/store", "symbols": [ "ImmuStore.DualProof", "VerifyDualProof", "VerifyLinearProof" ] } ] }