Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compiler allows passing a value in builtin raw_call even if the call is a delegatecall or a staticcall. But in the context of delegatecall and staticcall the handling of value is not possible due to the semantics of the respective opcodes, and vyper will silently ignore the value= argument. If the semantics of the EVM are unknown to the developer, he could suspect that by specifying the `value` kwarg, exactly the given amount will be sent along to the target. This vulnerability affects 0.3.10 and earlier versions.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/blob/9136169468f317a53b4e7448389aa315f90b95ba/vyper/builtins/functions.py#L1100 | Exploit |
https://github.com/vyperlang/vyper/security/advisories/GHSA-x2c2-q32w-4w6m | Exploit Vendor Advisory |
Configurations
History
06 Feb 2024, 19:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/vyperlang/vyper/security/advisories/GHSA-x2c2-q32w-4w6m - Exploit, Vendor Advisory | |
References | () https://github.com/vyperlang/vyper/blob/9136169468f317a53b4e7448389aa315f90b95ba/vyper/builtins/functions.py#L1100 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
First Time |
Vyperlang
Vyperlang vyper |
30 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-30 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-24567
Mitre link : CVE-2024-24567
CVE.ORG link : CVE-2024-24567
JSON object : View
Products Affected
vyperlang
- vyper
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions