OpenZeppelin Contracts up to 4.8.1 Batch Size calculation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.8 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in OpenZeppelin Contracts up to 4.8.1. Impacted is an unknown function of the component Batch Size Handler. Executing a manipulation can lead to calculation. The identification of this vulnerability is CVE-2023-26488. The attack may be launched remotely. There is no exploit available. Upgrading the affected component is recommended.
Details
A vulnerability has been found in OpenZeppelin Contracts up to 4.8.1 and classified as problematic. This vulnerability affects an unknown code block of the component Batch Size Handler. The manipulation with an unknown input leads to a calculation vulnerability. The CWE definition for the vulnerability is CWE-682. The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management. As an impact it is known to affect integrity, and availability. CVE summarizes:
OpenZeppelin Contracts is a library for secure smart contract development. The ERC721Consecutive contract designed for minting NFTs in batches does not update balances when a batch has size 1 and consists of a single token. Subsequent transfers from the receiver of that token may overflow the balance as reported by `balanceOf`. The issue exclusively presents with batches of size 1. The issue has been patched in 4.8.2.
The weakness was shared 03/04/2023 as GHSA-878m-3g6q-594q. The advisory is shared for download at github.com. This vulnerability was named CVE-2023-26488 since 02/23/2023. There are neither technical details nor an exploit publicly available.
Upgrading to version 4.8.2 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 167bf67ed3907f4a674043496019fa346cee7705 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.8
VulDB Base Score: 5.4
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 6.5
CNA Vector (GitHub, Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: CalculationCWE: CWE-682
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: OpenZeppelin Contracts 4.8.2
Patch: 167bf67ed3907f4a674043496019fa346cee7705
Timeline
02/23/2023 🔍03/04/2023 🔍
03/04/2023 🔍
03/04/2023 🔍
Sources
Advisory: GHSA-878m-3g6q-594qStatus: Confirmed
CVE: CVE-2023-26488 (🔍)
GCVE (CVE): GCVE-0-2023-26488
GCVE (VulDB): GCVE-100-222304
Entry
Created: 03/04/2023 09:47Changes: 03/04/2023 09:47 (52)
Complete: 🔍
Cache ID: 216:F93:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.