First published: Fri Jun 16 2023(Updated: )
### Impact When the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertently for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree. A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the [@openzeppelin/merkle-tree](https://github.com/OpenZeppelin/merkle-tree) library are safe. ### Patches The problem has been patched in 4.9.2. ### Workarounds If you are using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the [@openzeppelin/merkle-tree](https://www.npmjs.com/package/@openzeppelin/merkle-tree) package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@openzeppelin/contracts-upgradeable | >=4.7.0<4.9.2 | 4.9.2 |
npm/@openzeppelin/contracts | >=4.7.0<4.9.2 | 4.9.2 |
OpenZeppelin Contracts | >=4.7.0<4.9.2 | |
OpenZeppelin Contracts Upgradeable | >=4.7.0<4.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability associated with CVE-2023-34459 is related to OpenZeppelin Contracts version 4.7.0 to 4.9.2 and allows for the construction of malicious Merkle trees.
The vulnerability manifests when using the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions in OpenZeppelin Contracts versions 4.7.0 to 4.9.2.
The severity of the OpenZeppelin Contracts vulnerability (CVE-2023-34459) is medium with a CVSS score of 5.9.
OpenZeppelin Contracts versions 4.7.0 to 4.9.2 are affected by the vulnerability.
To fix the vulnerability in OpenZeppelin Contracts, you should update to version 4.9.2 or later.