ID:
openzeppelin-1124
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Solidity
Smart Contract
Rewards - Bug Bounties
Extended Method:
Logic error allowing the check to see if the call was approved occurs after the call was already executed can be bypassed.
Days in Operation:
2233
(6.12 Years)





100 pts each
Whitehat Zb3 submitted a critical reentrancy vulnerability in OpenZeppelin’s TimelockController contract, which affected a project hosted on Immunefi’s bug bounty platform. The project, which has elected to remain anonymous, has paid the whitehat an undisclosed amount (including a bonus for anonymity), and OpenZeppelin has graciously paid the whitehat a bounty of $25,000 for their contribution to community security and issued a patch.
This is the only critical vulnerability that OpenZeppelin has ever had in its open source smart contract library to the best of its knowledge. The vulnerability has been patched in the affected project, and OpenZeppelin has released an updated contract version which fixes the vulnerability.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.