# Shardeum Ancillaries II

## Reports by Severity

<details>

<summary>Critical</summary>

* \#35709 \[W\&A-Critical] Potential DoS of archiver-server during network restoration via get\_account\_data\_archiver call
* \#36025 \[W\&A-Critical] A malicious validator can overwrite the account data of any archive server connected to it.

</details>

<details>

<summary>High</summary>

* \#35903 \[W\&A-High] SQL Injection Allows a Malicious Archiver to Overwrite Receipt/originalTxData Database on Any Active Archiver in the Network
* \#35447 \[W\&A-High] Zero Click Full Account Takeover
* \#35452 \[W\&A-High] Admin Panel Accessed
* \#35979 \[W\&A-High] Malicious Archiver/Malicious Validator can overwrite data on any active archiver and more

</details>

<details>

<summary>Medium</summary>

* \#35824 \[W\&A-Medium] \`/set-config\` replay attack is possible in production mode after archiver restart

</details>

<details>

<summary>Insight</summary>

* \#35157 \[W\&A-Insight] Unauthorized Access to Shardeum Config Store using default credentials
* \#35534 \[W\&A-Insight] json rpc server remote crash
* \#35446 \[W\&A-Insight] IDOR Able to change other user information
* \#35972 \[W\&A-Insight] Operator-GUI Weak JWT Token Generation Led To Generate same JWT Tokens Even if The User Has it's Unique "nodeId"
* \#36005 \[W\&A-Insight] Reflected URL Manipulation and Phishing Risk
* \#35996 \[W\&A-Insight] Malicious Explorer can cause Denial of Service in JSON RPC server and even crash it
* \#35537 \[W\&A-Insight] json rpc server websocket remote crash
* \#35351 \[W\&A-Insight] Password Length Bypass in Shardeum Authentication System
* \#35598 \[W\&A-Insight] Access to debug endpoints without any protection

</details>

## Reports by Type

<details>

<summary>Websites &#x26; Applications</summary>

* \#35709 \[W\&A-Critical] Potential DoS of archiver-server during network restoration via get\_account\_data\_archiver call
* \#35157 \[W\&A-Insight] Unauthorized Access to Shardeum Config Store using default credentials
* \#35534 \[W\&A-Insight] json rpc server remote crash
* \#35824 \[W\&A-Medium] \`/set-config\` replay attack is possible in production mode after archiver restart
* \#35903 \[W\&A-High] SQL Injection Allows a Malicious Archiver to Overwrite Receipt/originalTxData Database on Any Active Archiver in the Network
* \#35446 \[W\&A-Insight] IDOR Able to change other user information
* \#35447 \[W\&A-High] Zero Click Full Account Takeover
* \#35972 \[W\&A-Insight] Operator-GUI Weak JWT Token Generation Led To Generate same JWT Tokens Even if The User Has it's Unique "nodeId"
* \#35452 \[W\&A-High] Admin Panel Accessed
* \#36005 \[W\&A-Insight] Reflected URL Manipulation and Phishing Risk
* \#36025 \[W\&A-Critical] A malicious validator can overwrite the account data of any archive server connected to it.
* \#35979 \[W\&A-High] Malicious Archiver/Malicious Validator can overwrite data on any active archiver and more
* \#35996 \[W\&A-Insight] Malicious Explorer can cause Denial of Service in JSON RPC server and even crash it
* \#35537 \[W\&A-Insight] json rpc server websocket remote crash
* \#35351 \[W\&A-Insight] Password Length Bypass in Shardeum Authentication System
* \#35598 \[W\&A-Insight] Access to debug endpoints without any protection

</details>
