vipinsun / blockchain-carbon-accounting

Apache License 2.0
0 stars 0 forks source link

CVE-2023-30541 (Medium) detected in contracts-3.3.0.tgz, contracts-upgradeable-3.4.1.tgz #210

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-30541 - Medium Severity Vulnerability

Vulnerable Libraries - contracts-3.3.0.tgz, contracts-upgradeable-3.4.1.tgz

contracts-3.3.0.tgz

Secure Smart Contract library for Solidity

Library home page: https://registry.npmjs.org/@openzeppelin/contracts/-/contracts-3.3.0.tgz

Path to dependency file: /net-emissions-token-network/package.json

Path to vulnerable library: /net-emissions-token-network/package.json

Dependency Hierarchy: - :x: **contracts-3.3.0.tgz** (Vulnerable Library)

contracts-upgradeable-3.4.1.tgz

Secure Smart Contract library for Solidity

Library home page: https://registry.npmjs.org/@openzeppelin/contracts-upgradeable/-/contracts-upgradeable-3.4.1.tgz

Path to dependency file: /net-emissions-token-network/package.json

Path to vulnerable library: /net-emissions-token-network/package.json

Dependency Hierarchy: - :x: **contracts-upgradeable-3.4.1.tgz** (Vulnerable Library)

Found in HEAD commit: d388e16464e00b9ce84df0d247029f534a429b90

Found in base branch: main

Vulnerability Details

OpenZeppelin Contracts is a library for secure smart contract development. A function in the implementation contract may be inaccessible if its selector clashes with one of the proxy's own selectors. Specifically, if the clashing function has a different signature with incompatible ABI encoding, the proxy could revert while attempting to decode the arguments from calldata. The probability of an accidental clash is negligible, but one could be caused deliberately and could cause a reduction in availability. The issue has been fixed in version 4.8.3. As a workaround if a function appears to be inaccessible for this reason, it may be possible to craft the calldata such that ABI decoding does not fail at the proxy and the function is properly proxied through.

Publish Date: 2023-04-17

URL: CVE-2023-30541

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-mx2q-35m2-x2rh

Release Date: 2023-04-17

Fix Resolution: 4.8.3


Step up your Open Source Security Game with Mend here