#42234 [BC-Insight] Missing Match Arm in to_single_key_authenticators() Allows WebAuthn Signatures Despite WEBAUTHN_SIGNATURE Being Disabled
Description
Summary
Vulnerability Details
TransactionAuthenticator Enum
TransactionAuthenticator Enum#[derive(Clone, Debug, Eq, PartialEq, Hash, Serialize, Deserialize)]
pub enum TransactionAuthenticator {
/// Single Ed25519 signature
Ed25519 {
public_key: Ed25519PublicKey,
signature: Ed25519Signature,
},
/// K-of-N multisignature
MultiEd25519 {
public_key: MultiEd25519PublicKey,
signature: MultiEd25519Signature,
},
/// Multi-agent transaction.
MultiAgent {
sender: AccountAuthenticator,
secondary_signer_addresses: Vec<AccountAddress>,
secondary_signers: Vec<AccountAuthenticator>,
},
/// Optional Multi-agent transaction with a fee payer.
FeePayer {
sender: AccountAuthenticator,
secondary_signer_addresses: Vec<AccountAddress>,
secondary_signers: Vec<AccountAuthenticator>,
fee_payer_address: AccountAddress,
fee_payer_signer: AccountAuthenticator,
},
SingleSender {
sender: AccountAuthenticator,
},
}to_single_key_authenticators() Snippet
to_single_key_authenticators() SnippetUnderlying Gating Check
Impact
Proof of Concept
Previous42233 [BC-Critical] critical dos vulnerability in movement network s da layer due to zstd bomb blob exploit Next#42395 [BC-High] Movement does not allow overwriting transactions with a higher priority, breaking Aptos mempool logic
Was this helpful?