CVE-2022-31172 – @openzeppelin/contracts
Package
Manager: npm
Name: @openzeppelin/contracts
Vulnerable Version: >=4.1.0 <4.7.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00108 pctl0.29684
Details
OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers ### Impact `SignatureChecker.isValidSignatureNow` is not expected to revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-1271 as expected. The contracts that may be affected are those that use `SignatureChecker` to check the validity of a signature and handle invalid signatures in a way other than reverting. We believe this to be unlikely. ### Patches The issue was patched in 4.7.1. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552 ### For more information If you have any questions or comments about this advisory, or need assistance deploying the fix, email us at [security@openzeppelin.com](mailto:security@openzeppelin.com).
Metadata
Created: 2022-07-21T22:33:37Z
Modified: 2022-07-21T22:33:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-4g63-c64m-25w9/GHSA-4g63-c64m-25w9.json
CWE IDs: ["CWE-20", "CWE-347"]
Alternative ID: GHSA-4g63-c64m-25w9
Finding: F163
Auto approve: 1