CVE-2022-35961 – @openzeppelin/contracts-upgradeable
Package
Manager: npm
Name: @openzeppelin/contracts-upgradeable
Vulnerable Version: >=4.1.0 <4.7.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L
EPSS: 0.00127 pctl0.32901
Details
OpenZeppelin Contracts vulnerable to ECDSA signature malleability ### Impact The functions `ECDSA.recover` and `ECDSA.tryRecover` are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single `bytes` argument, and not the functions that take `r, v, s` or `r, vs` as separate arguments. The potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used rather than the signed message or a nonce included in it. A user may take a signature that has already been submitted, submit it again in a different form, and bypass this protection. ### Patches The issue has been patched in 4.7.3. ### For more information If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [security@openzeppelin.com](mailto:security@openzeppelin.com).
Metadata
Created: 2022-08-18T19:00:43Z
Modified: 2022-08-18T19:00:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-4h98-2769-gh6h/GHSA-4h98-2769-gh6h.json
CWE IDs: ["CWE-354"]
Alternative ID: GHSA-4h98-2769-gh6h
Finding: F086
Auto approve: 1