logo

CVE-2023-42460 vyper

Package

Manager: pip
Name: vyper
Vulnerable Version: >=0.3.4 <0.3.10

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00048 pctl0.14467

Details

Vyper's `_abi_decode` input not validated in complex expressions ### Impact `_abi_decode()` does not validate input when it is nested in an expression. the following example gets correctly validated (bounds checked): ```vyper x: int128 = _abi_decode(slice(msg.data, 4, 32), int128) ``` however, the following example is not bounds checked ```vyper @external def abi_decode(x: uint256) -> uint256: a: uint256 = convert(_abi_decode(slice(msg.data, 4, 32), (uint8)), uint256) + 1 return a # abi_decode(256) returns: 257 ``` the issue can be triggered by constructing an example where the output of `_abi_decode` is not internally passed to `make_setter` (an internal codegen routine) or other input validating routine. ### Patches https://github.com/vyperlang/vyper/pull/3626 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_

Metadata

Created: 2023-09-26T19:34:53Z
Modified: 2024-11-19T17:23:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-cx2q-hfxr-rj97/GHSA-cx2q-hfxr-rj97.json
CWE IDs: ["CWE-682"]
Alternative ID: GHSA-cx2q-hfxr-rj97
Finding: F138
Auto approve: 1