
We found results for “”
CVE-2022-35961
Good to know:

Date: August 13, 2022
OpenZeppelin Contracts is a library for secure smart contract development. The functions "ECDSA.recover" and "ECDSA.tryRecover" are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single "bytes" argument, and not the functions that take "r, v, s" or "r, vs" as separate arguments. The potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used rather than the signed message or a nonce included in it. A user may take a signature that has already been submitted, submit it again in a different form, and bypass this protection. The issue has been patched in 4.7.3.
Language: JS
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Validation of Integrity Check Value
CWE-354Top Fix

Upgrade Version
Upgrade to version @openzeppelin/contracts-upgradeable - 4.7.3;@openzeppelin/contracts - 4.7.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | LOW |