A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric.
References
Link | Resource |
---|---|
https://github.com/hyperledger/fabric/pull/2828 | Patch Third Party Advisory |
https://jira.hyperledger.org/browse/FAB-18528 | Vendor Advisory |
https://github.com/hyperledger/fabric/pull/2828 | Patch Third Party Advisory |
https://jira.hyperledger.org/browse/FAB-18528 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hyperledger/fabric/pull/2828 - Patch, Third Party Advisory | |
References | () https://jira.hyperledger.org/browse/FAB-18528 - Vendor Advisory |
Information
Published : 2021-11-18 16:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43669
Mitre link : CVE-2021-43669
CVE.ORG link : CVE-2021-43669
JSON object : View
Products Affected
linuxfoundation
- fabric
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')