Description
@web3-react is a framework for building Ethereum Apps . In affected versions the `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This issue has been addressed in PR #749 and is available in updated npm artifacts. There are no known workarounds for this issue. Users are advised to upgrade.
Remediation
References
https://github.com/Uniswap/web3-react/pull/749
https://github.com/Uniswap/web3-react/security/advisories/GHSA-8pf3-6fgr-3g3g
Related Vulnerabilities
CVE-2016-1000229 Vulnerability in maven package org.webjars.npm:swagger-ui
CVE-2021-34428 Vulnerability in maven package org.eclipse.jetty:jetty-server
CVE-2021-3827 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2022-2047 Vulnerability in maven package org.eclipse.jetty:jetty-http
CVE-2016-4433 Vulnerability in maven package org.apache.struts.xwork:xwork-core