Improper Input Validation Affecting openzeppelin-solidity package, versions >=4.8.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-OPENZEPPELINSOLIDITY-5711904
- published 18 Jun 2023
- disclosed 18 Jun 2023
- credit Unknown
Introduced: 18 Jun 2023
CVE-2023-34459 Open this link in a new tabHow to fix?
There is no fixed version for openzeppelin-solidity
.
Overview
openzeppelin-solidity is a Secure Smart Contract library for Solidity
Affected versions of this package are vulnerable to Improper Input Validation when the verifyMultiProof
, verifyMultiProofCalldata
, procesprocessMultiProof
, or processMultiProofCalldat
functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree.
A contract is not vulnerable if it uses single-leaf proving (verify
, verifyCalldata
, processProof
, or processProofCalldata
), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree
library are safe.