Vulnerability Description
ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value when using delegate call mechanics, either through `CallBuilder::delegate` or `ink_env::invoke_contract_delegate`, is decoded incorrectly. This bug was related to the mechanics around decoding a call's return buffer, which was changed as part of pull request 1450. Since this feature was only released in ink! 4.0.0, no previous versions are affected. Users who have an ink! 4.x series contract should upgrade to 4.2.1 to receive a patch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parity | Ink\! | >= 4.0.0, < 4.2.1 |
Related Weaknesses (CWE)
References
- https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegaExploitThird Party Advisory
- https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.htmlExploitThird Party Advisory
- https://github.com/paritytech/ink/commit/f1407ee9f87e5f64d467a22d26ee88f61db7f3dPatch
- https://github.com/paritytech/ink/pull/1450PatchVendor Advisory
- https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8fExploitPatchVendor Advisory
- https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegaExploitThird Party Advisory
- https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.htmlExploitThird Party Advisory
- https://github.com/paritytech/ink/commit/f1407ee9f87e5f64d467a22d26ee88f61db7f3dPatch
- https://github.com/paritytech/ink/pull/1450PatchVendor Advisory
- https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8fExploitPatchVendor Advisory
FAQ
What is CVE-2023-34449?
CVE-2023-34449 is a vulnerability with a CVSS score of 5.3 (MEDIUM). ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value w...
How severe is CVE-2023-34449?
CVE-2023-34449 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-34449?
Check the references section above for vendor advisories and patch information. Affected products include: Parity Ink\!.