Headline
GHSA-9j3m-g383-29qr: OpenZeppelin Contracts's Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls
Impact
Contracts using the cross chain utilies for Arbitrum L2, CrossChainEnabledArbitrumL2
or LibArbitrumL2
, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA on the contract could also be taken by the EOA through the bridge if the issue was not present.
Patches
This issue has been patched in v4.7.2.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578
For more information
If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [email protected].
Package
npm @openzeppelin/contracts (npm)
Affected versions
>= 4.6.0, < 4.7.2
Patched versions
4.7.2
npm @openzeppelin/contracts-upgradeable (npm)
>= 4.6.0, < 4.7.2
4.7.2
Description
Impact
Contracts using the cross chain utilies for Arbitrum L2, CrossChainEnabledArbitrumL2 or LibArbitrumL2, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA on the contract could also be taken by the EOA through the bridge if the issue was not present.
Patches
This issue has been patched in v4.7.2.
References
OpenZeppelin/openzeppelin-contracts#3578
For more information
If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [email protected].
References
- GHSA-9j3m-g383-29qr
- https://nvd.nist.gov/vuln/detail/CVE-2022-35916
- OpenZeppelin/openzeppelin-contracts#3578
- https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.7.2
frangio published the maintainer security advisory
Jul 28, 2022
Severity
Moderate
5.3
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Weaknesses
CWE-669
CVE ID
CVE-2022-35916
GHSA ID
GHSA-9j3m-g383-29qr
Source code
OpenZeppelin/openzeppelin-contracts
Checking history
See something to contribute? Suggest improvements for this vulnerability.
Related news
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.