CVE-2023-23940

OpenZeppelin Contracts for Cairo is a library for secure smart contract development written in Cairo for StarkNet, a decentralized ZK Rollup. `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. The issue has been patched in 0.6.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:cairo:*:*

History

21 Nov 2024, 07:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 6.4
References () https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299 - Patch, Third Party Advisory () https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299 - Patch, Third Party Advisory
References () https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4 - Third Party Advisory () https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4 - Third Party Advisory

Information

Published : 2023-02-03 20:15

Updated : 2024-11-21 07:47


NVD link : CVE-2023-23940

Mitre link : CVE-2023-23940

CVE.ORG link : CVE-2023-23940


JSON object : View

Products Affected

openzeppelin

  • contracts
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-347

Improper Verification of Cryptographic Signature