CVE-2023-23940

OpenZeppelin Contracts for Cairo is a library for secure smart contract development written in Cairo for StarkNet, a decentralized ZK Rollup. `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. The issue has been patched in 0.6.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:cairo:*:*

History

07 Nov 2023, 04:08

Type Values Removed Values Added
Summary OpenZeppelin Contracts for Cairo is a library for secure smart contract development written in Cairo for StarkNet, a decentralized ZK Rollup. `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. The issue has been patched in 0.6.1. OpenZeppelin Contracts for Cairo is a library for secure smart contract development written in Cairo for StarkNet, a decentralized ZK Rollup. `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. The issue has been patched in 0.6.1.

13 Feb 2023, 15:11

Type Values Removed Values Added
References (MISC) https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4 - (MISC) https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4 - Third Party Advisory
References (MISC) https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299 - (MISC) https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299 - Patch, Third Party Advisory
CPE cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:cairo:*:*
CWE CWE-345
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Openzeppelin
Openzeppelin contracts

03 Feb 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-03 20:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-23940

Mitre link : CVE-2023-23940

CVE.ORG link : CVE-2023-23940


JSON object : View

Products Affected

openzeppelin

  • contracts
CWE
CWE-347

Improper Verification of Cryptographic Signature

CWE-345

Insufficient Verification of Data Authenticity