logo

CVE-2023-32675 vyper

Package

Manager: pip
Name: vyper
Vulnerable Version: >=0 <0.3.8

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00182 pctl0.40168

Details

Vyper's nonpayable default functions are sometimes payable ### Impact in contracts with at least one regular nonpayable function, due to the callvalue check being inside of the selector section, it is possible to send funds to the default function by using less than 4 bytes of calldata, even if the default function is marked `nonpayable`. this applies to contracts compiled with vyper<=0.3.7. ```vyper # @version 0.3.7 # implicitly nonpayable @external def foo() -> uint256: return 1 # implicitly nonpayable @external def __default__(): # could receive ether here pass ``` ### Patches this was fixed by the removal of the global calldatasize check in https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520. ### Workarounds don't use nonpayable default functions

Metadata

Created: 2023-05-22T20:35:46Z
Modified: 2024-11-19T16:42:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-vxmm-cwh2-q762/GHSA-vxmm-cwh2-q762.json
CWE IDs: ["CWE-670"]
Alternative ID: GHSA-vxmm-cwh2-q762
Finding: F164
Auto approve: 1