ghsa-9vx6-7xxf-x967
Vulnerability from github
Published
2024-02-29 20:09
Modified
2024-02-29 20:09
VLAI Severity ?
Summary
OpenZeppelin Contracts base64 encoding may read from potentially dirty memory
Details
Impact
The Base64.encode
function encodes a bytes
input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.
Although the encode
function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:
- A
bytes memory
struct is allocated just after the input and the first bytes of it are non-zero. - The memory pointer is set to a non-empty memory location before allocating the input.
Developers should evaluate whether the extra bits can be maliciously manipulated by an attacker.
Patches
Upgrade to 5.0.2 or 4.9.6.
References
This issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@rileyholterhus on X)
{ "affected": [ { "package": { "ecosystem": "npm", "name": "@openzeppelin/contracts" }, "ranges": [ { "events": [ { "introduced": "4.5.0" }, { "fixed": "4.9.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@openzeppelin/contracts-upgradeable" }, "ranges": [ { "events": [ { "introduced": "5.0.0-rc.0" }, { "fixed": "5.0.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@openzeppelin/contracts" }, "ranges": [ { "events": [ { "introduced": "5.0.0-rc.0" }, { "fixed": "5.0.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@openzeppelin/contracts-upgradeable" }, "ranges": [ { "events": [ { "introduced": "4.5.0" }, { "fixed": "4.9.6" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-27094" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": true, "github_reviewed_at": "2024-02-29T20:09:53Z", "nvd_published_at": null, "severity": "LOW" }, "details": "### Impact\n\nThe `Base64.encode` function encodes a `bytes` input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.\n\nAlthough the `encode` function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:\n\n- A `bytes memory` struct is allocated just after the input and the first bytes of it are non-zero.\n- The memory pointer is set to a non-empty memory location before allocating the input.\n\nDevelopers should evaluate whether the extra bits can be maliciously manipulated by an attacker.\n\n### Patches\n\nUpgrade to 5.0.2 or 4.9.6.\n\n### References\n\nThis issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@rileyholterhus on X)", "id": "GHSA-9vx6-7xxf-x967", "modified": "2024-02-29T20:09:53Z", "published": "2024-02-29T20:09:53Z", "references": [ { "type": "WEB", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9vx6-7xxf-x967" }, { "type": "WEB", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/commit/2d081f24cac1a867f6f73d512f2022e1fa987854" }, { "type": "WEB", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/commit/723f8cab09cdae1aca9ec9cc1cfa040c2d4b06c1" }, { "type": "WEB", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts/commit/92224533b1263772b0774eec3134e132a3d7b2a6" }, { "type": "WEB", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts/commit/a6286d0fded8771b3a645e5813e51993c490399c" }, { "type": "PACKAGE", "url": "https://github.com/OpenZeppelin/openzeppelin-contracts" } ], "schema_version": "1.4.0", "severity": [], "summary": "OpenZeppelin Contracts base64 encoding may read from potentially dirty memory" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…