icon

We found results for “

CVE-2022-35961

Good to know:

icon

Date: August 13, 2022

OpenZeppelin Contracts is a library for secure smart contract development. The functions "ECDSA.recover" and "ECDSA.tryRecover" are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single "bytes" argument, and not the functions that take "r, v, s" or "r, vs" as separate arguments. The potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used rather than the signed message or a nonce included in it. A user may take a signature that has already been submitted, submit it again in a different form, and bypass this protection. The issue has been patched in 4.7.3.

Language: JS

Severity Score

Severity Score

Weakness Type (CWE)

Improper Validation of Integrity Check Value

CWE-354

Top Fix

icon

Upgrade Version

Upgrade to version @openzeppelin/contracts-upgradeable - 4.7.3;@openzeppelin/contracts - 4.7.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): LOW

Do you need more information?

Contact Us