Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h | Vendor Advisory |
https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h | Vendor Advisory |
Configurations
History
02 Jan 2025, 22:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
First Time |
Vyperlang
Vyperlang vyper |
|
References | () https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h - Vendor Advisory | |
CWE | NVD-CWE-Other |
Information
Published : 2024-04-25 18:15
Updated : 2025-01-02 22:39
NVD link : CVE-2024-32649
Mitre link : CVE-2024-32649
CVE.ORG link : CVE-2024-32649
JSON object : View
Products Affected
vyperlang
- vyper
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
NVD-CWE-Other