CVE-2023-42460

Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

29 Sep 2023, 18:41

Type Values Removed Values Added
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
First Time Vyperlang
Vyperlang vyper
References (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97 - (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97 - Exploit, Patch, Third Party Advisory
References (MISC) https://github.com/vyperlang/vyper/pull/3626 - (MISC) https://github.com/vyperlang/vyper/pull/3626 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2024-02-28 20:33


NVD link : CVE-2023-42460

Mitre link : CVE-2023-42460

CVE.ORG link : CVE-2023-42460


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-682

Incorrect Calculation