Описание
OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
Ссылки
- PatchRelease NotesThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- PatchRelease NotesThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.3.0 (включая) до 3.4.2 (исключая)Версия от 4.0.0 (включая) до 4.3.1 (исключая)
Одно из
cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*
cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 63%
0.00443
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-269
CWE-269
Связанные уязвимости
CVSS3: 10
github
больше 4 лет назад
TimelockController vulnerability in OpenZeppelin Contracts
EPSS
Процентиль: 63%
0.00443
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-269
CWE-269