First published: Wed Jun 07 2023(Updated: )
OpenZeppelin Contracts is a library for smart contract development. By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. This problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. Users are advised to upgrade. Users unable to upgrade may submit the proposal creation transaction to an endpoint with frontrunning protection as a workaround.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@openzeppelin/contracts-upgradeable | >=4.3.0<4.9.1 | 4.9.1 |
npm/@openzeppelin/contracts | >=4.3.0<4.9.1 | 4.9.1 |
OpenZeppelin Contracts | >=4.3.0<4.9.1 | |
OpenZeppelin Contracts Upgradeable | >=4.3.0<4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34234 is a vulnerability in the OpenZeppelin Contracts library that allows an attacker to frontrun the creation of a proposal and cancel it, potentially preventing the proposal from being proposed at all.
CVE-2023-34234 impacts OpenZeppelin Contracts by allowing an attacker to become the proposer of a proposal and gain the ability to cancel it repeatedly, potentially disrupting the proposal process.
CVE-2023-34234 has a severity level of 5.3 (Medium).
OpenZeppelin Contracts versions 4.3.0 to 4.9.1 and OpenZeppelin Contracts Upgradeable versions 4.3.0 to 4.9.1 are affected by CVE-2023-34234.
To mitigate CVE-2023-34234, it is recommended to update to a version of OpenZeppelin Contracts or OpenZeppelin Contracts Upgradeable that is not affected by the vulnerability.