An issue was discovered in IPFS (aka go-ipfs) 0.4.23. An attacker can generate ephemeral identities (Sybils) and leverage the IPFS connection management reputation system to poison other nodes' routing tables, eclipsing the nodes that are the target of the attack from the rest of the network. Later versions, in particular go-ipfs 0.7, mitigate this.
References
Link | Resource |
---|---|
https://blog.ipfs.io/2020-10-30-dht-hardening/ | Vendor Advisory |
https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys | Third Party Advisory |
https://blog.ipfs.io/2020-10-30-dht-hardening/ | Vendor Advisory |
https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.ipfs.io/2020-10-30-dht-hardening/ - Vendor Advisory | |
References | () https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys - Third Party Advisory |
Information
Published : 2020-11-02 21:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-10937
Mitre link : CVE-2020-10937
CVE.ORG link : CVE-2020-10937
JSON object : View
Products Affected
protocol
- ipfs
CWE