Vulnerability Description
Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vyperlang | Vyper | >= 0.3.4, < 0.3.10 |
Related Weaknesses (CWE)
References
- https://github.com/vyperlang/vyper/pull/3626Patch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97ExploitPatchThird Party Advisory
- https://github.com/vyperlang/vyper/pull/3626Patch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-cx2q-hfxr-rj97ExploitPatchThird Party Advisory
FAQ
What is CVE-2023-42460?
CVE-2023-42460 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow...
How severe is CVE-2023-42460?
CVE-2023-42460 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-42460?
Check the references section above for vendor advisories and patch information. Affected products include: Vyperlang Vyper.