OpenZeppelin Contracts vulnerable to Improper Escaping of Output
Moderate severity
GitHub Reviewed
Published
Aug 10, 2023
in
OpenZeppelin/openzeppelin-contracts
•
Updated Nov 4, 2023
Description
Published by the National Vulnerability Database
Aug 10, 2023
Published to the GitHub Advisory Database
Aug 11, 2023
Reviewed
Aug 11, 2023
Last updated
Nov 4, 2023
Impact
OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using
ERC2771Context
along with a custom trusted forwarder may see_msgSender
returnaddress(0)
in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case forMinimalForwarder
from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders.Patches
The problem has been patched in v4.9.3.
References