NA

CVE-2023-40014

Published: 10/08/2023 Updated: 23/08/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder may see `_msgSender` return `address(0)` in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case for `MinimalForwarder` from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders. The problem has been patched in v4.9.3.

Vulnerable Product Search on Vulmon Subscribe to Product

openzeppelin openzeppelin contracts-upgradable

openzeppelin openzeppelin contracts

Github Repositories

test

Report Audit report for 2023-12-autonolas generated by ubl4nk_bot Medium Issues Total 9 instances over 3 issues: ID Issue Instances M-1 Non-compliant IERC20 tokens may revert with transfer 2 M-2 Return values of transfer()/transferFrom() not checked 3 M-3 transfer/transferFrom may never return true for some tokens 4 Low Issues Total 522 instances over 29 issues: