{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:22:00.830","vulnerabilities":[{"cve":{"id":"CVE-2021-39193","sourceIdentifier":"security-advisories@github.com","published":"2021-09-03T18:15:07.197","lastModified":"2024-11-21T06:18:51.153","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frontier is Substrate's Ethereum compatibility layer. Prior to commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26, a bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. A patch is available in commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26. There are no workarounds aside from applying the patch."},{"lang":"es","value":"Frontier es la capa de compatibilidad con Ethereum de Substrate. Anterior al commit número 0b962f218f0cdd796dadfe26c3f09e68f7861b26, un error en \"pallet-ethereum\" puede causar que se incluyan transacciones no válidas en el estado del bloque de Ethereum en \"pallet-ethereum\" debido a que no es comprobado el tamaño de los datos de entrada. Cualquier transacción no válida incluida de esta manera no presenta posibilidad de alterar el estado interno de Ethereum o del Substrato. La transacción parecerá haber sido incluida, pero no tiene ningún efecto ya que es rechazada por el motor EVM. El impacto es aún más limitado por las restricciones de tamaño extrínsecas del sustrato. Se presenta un parche disponible en el commit número 0b962f218f0cdd796dadfe26c3f09e68f7861b26. No se presentan soluciones aparte de aplicar el parche"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:parity:frontier:*:*:*:*:*:*:*:*","versionEndExcluding":"2021-09-03","matchCriteriaId":"9F97ABF5-35F5-421C-8C67-1257F2386110"}]}]}],"references":[{"url":"https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/465","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/465","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}