Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/pull/3626 | Patch |
https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97 | Exploit Patch Third Party Advisory |
Configurations
History
29 Sep 2023, 18:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
First Time |
Vyperlang
Vyperlang vyper |
|
References | (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97 - Exploit, Patch, Third Party Advisory | |
References | (MISC) https://github.com/vyperlang/vyper/pull/3626 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
27 Sep 2023, 15:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 15:19
Updated : 2024-02-28 20:33
NVD link : CVE-2023-42460
Mitre link : CVE-2023-42460
CVE.ORG link : CVE-2023-42460
JSON object : View
Products Affected
vyperlang
- vyper
CWE
CWE-682
Incorrect Calculation