Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-9j3m-g383-29qr: OpenZeppelin Contracts's Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls

Impact

Contracts using the cross chain utilies for Arbitrum L2, CrossChainEnabledArbitrumL2 or LibArbitrumL2, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA on the contract could also be taken by the EOA through the bridge if the issue was not present.

Patches

This issue has been patched in v4.7.2.

References

https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578

For more information

If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [email protected].

ghsa
#vulnerability#nodejs#git

Package

npm @openzeppelin/contracts (npm)

Affected versions

>= 4.6.0, < 4.7.2

Patched versions

4.7.2

npm @openzeppelin/contracts-upgradeable (npm)

>= 4.6.0, < 4.7.2

4.7.2

Description

Impact

Contracts using the cross chain utilies for Arbitrum L2, CrossChainEnabledArbitrumL2 or LibArbitrumL2, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA on the contract could also be taken by the EOA through the bridge if the issue was not present.

Patches

This issue has been patched in v4.7.2.

References

OpenZeppelin/openzeppelin-contracts#3578

For more information

If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [email protected].

References

  • GHSA-9j3m-g383-29qr
  • https://nvd.nist.gov/vuln/detail/CVE-2022-35916
  • OpenZeppelin/openzeppelin-contracts#3578
  • https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.7.2

frangio published the maintainer security advisory

Jul 28, 2022

Severity

Moderate

5.3

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

None

User interaction

None

Scope

Unchanged

Confidentiality

None

Integrity

Low

Availability

None

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Weaknesses

CWE-669

CVE ID

CVE-2022-35916

GHSA ID

GHSA-9j3m-g383-29qr

Source code

OpenZeppelin/openzeppelin-contracts

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2022-35916: Fix arbitrum L1 to L2 crosschain call detection by Amxx · Pull Request #3578 · OpenZeppelin/openzeppelin-contracts

OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.