CVE-2021-21369

Sep 3, 2024

Published Date: 2021-03-09T18:15Z
Last Modified: 2021-03-16T17:25Z

CVSS Score: 6.5 (MEDIUM)

EPSS Score: 0.11%

Risk Score: 4.55 (MEDIUM)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 6.5  |  EPSS: 0.11%

Description: Hyperledger Besu is an open-source, MainNet compatible, Ethereum client written in Java. In Besu before version 1.5.1 there is a denial-of-service vulnerability involving the HTTP JSON-RPC API service. If username and password authentication is enabled for the HTTP JSON-RPC API service, then prior to making any requests to an API endpoint the requestor must use the login endpoint to obtain a JSON web token (JWT) using their credentials. A single user can readily overload the login endpoint with invalid requests (incorrect password). As the supplied password is checked for validity on the main vertx event loop and takes a relatively long time this can cause the processing of other valid requests to fail. A valid username is required for this vulnerability to be exposed. This has been fixed in version 1.5.1.

Mitre ATT&CK Technical v15.1

T1153 – Source
T1589.001 – Credentials
T1053.002 – At

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

besu - linuxfoundation

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.