PyPi: Vyper

CVE-2023-42460

Safety vulnerability ID: 61478

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 27, 2023 Updated at Nov 25, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper versions before 0.3.10 are affected by CVE-2023-42460: The '_abi_decode()' function does not validate input when it is nested in an expression. Uses of '_abi_decode()' can be constructed which allow for bounds checking to be bypassed resulting in incorrect results.
https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97

Affected package

vyper

Latest version: 0.4.0

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626. See CVE-2023-42460.


MISC:https://github.com/vyperlang/vyper/pull/3626: https://github.com/vyperlang/vyper/pull/3626
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97: https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE