Improper validation of integrity check value in OpenZeppelin Contracts



Published: 2022-08-26
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-35961
CWE-ID CWE-354
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
OpenZeppelin Contracts
Universal components / Libraries / Libraries used by multiple products

Vendor OpenZeppelin

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper validation of integrity check value

EUVDB-ID: #VU66780

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-35961

CWE-ID: CWE-354 - Improper Validation of Integrity Check Value

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass integrity checks.

The vulnerability exists due to improper validation of integrity check value in the "ECDSA.recover" and "ECDSA.tryRecover" functions. A remote user can take a signature that has already been submitted, submit it again in a different form and bypass this protection.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenZeppelin Contracts: 4.1.0 - 4.7.2

External links

http://github.com/OpenZeppelin/openzeppelin-contracts/pull/3610
http://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-4h98-2769-gh6h
http://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.7.3


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###