OpenZeppelin Contracts for Cairo is a library for secure smart contract development written in Cairo for StarkNet, a decentralized ZK Rollup. `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. The issue has been patched in 0.6.1.
References
Link | Resource |
---|---|
https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299 | Patch Third Party Advisory |
https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4 | Third Party Advisory |
Configurations
Information
Published : 2023-02-03 12:15
Updated : 2023-02-13 07:11
NVD link : CVE-2023-23940
Mitre link : CVE-2023-23940
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
openzeppelin
- contracts