Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/babylonlabs-io/babylon
  4. ›
  5. GHSA-7mm3-vfg8-7rg6

GHSA-7mm3-vfg8-7rg6: Babylon Finality Provider `MsgCommitPubRandList` replay attack

May 15, 2025 (updated July 31, 2025)

A high vulnerability exists in the Babylon protocol’s x/finality module due to a lack of domain separation in signed messages, combined with insufficient validation in the MsgCommitPubRandList handler. Specifically, the handler does not enforce that the submitted Commitment field is 32 bytes long. This allows an attacker to replay a signature originally generated for a different message (e.g., a Proof-of-Possession in MsgCreateFinalityProvider) as a MsgCommitPubRandList. By crafting the message parameters, an attacker can use the typically 20-byte address bytes (from the PoP context) to form the StartHeight, NumPubRand, and a shorter-than-expected Commitment (e.g., 4 bytes). The replayed signature will pass verification for this crafted message, leading to the injection of an invalid PubRand commitment.

References

  • github.com/advisories/GHSA-7mm3-vfg8-7rg6
  • github.com/babylonlabs-io/babylon
  • github.com/babylonlabs-io/babylon/commit/cb5d0ecae5cebc116d09296baaed25f715f904df
  • github.com/babylonlabs-io/babylon/security/advisories/GHSA-7mm3-vfg8-7rg6
  • pkg.go.dev/vuln/GO-2025-3686

Code Behaviors & Features

Detect and mitigate GHSA-7mm3-vfg8-7rg6 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.1.0

Fixed versions

  • 1.1.0

Solution

Upgrade to version 1.1.0 or above.

Weakness

  • CWE-290: Authentication Bypass by Spoofing

Source file

go/github.com/babylonlabs-io/babylon/GHSA-7mm3-vfg8-7rg6.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:24 +0000.