CVE-2023-32675 – vyper
Package
Manager: pip
Name: vyper
Vulnerable Version: >=0 <0.3.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00182 pctl0.40168
Details
Vyper's nonpayable default functions are sometimes payable ### Impact in contracts with at least one regular nonpayable function, due to the callvalue check being inside of the selector section, it is possible to send funds to the default function by using less than 4 bytes of calldata, even if the default function is marked `nonpayable`. this applies to contracts compiled with vyper<=0.3.7. ```vyper # @version 0.3.7 # implicitly nonpayable @external def foo() -> uint256: return 1 # implicitly nonpayable @external def __default__(): # could receive ether here pass ``` ### Patches this was fixed by the removal of the global calldatasize check in https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520. ### Workarounds don't use nonpayable default functions
Metadata
Created: 2023-05-22T20:35:46Z
Modified: 2024-11-19T16:42:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-vxmm-cwh2-q762/GHSA-vxmm-cwh2-q762.json
CWE IDs: ["CWE-670"]
Alternative ID: GHSA-vxmm-cwh2-q762
Finding: F164
Auto approve: 1