PyPi: Vyper

CVE-2023-32675

Safety vulnerability ID: 58743

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 19, 2023 Updated at May 16, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper 0.3.8 includes a fix for CVE-2023-32675: In contracts with more than one regular nonpayable function, it is possible to send funds to the default function, even if the default function is marked 'nonpayable'. This applies to contracts compiled with vyper versions prior to 0.3.8. This issue was fixed by the removal of the global 'calldatasize' check in commit '02339dfda'. Users unable to upgrade should avoid use of nonpayable default functions.
https://github.com/vyperlang/vyper/security/advisories/GHSA-vxmm-cwh2-q762

Affected package

vyper

Latest version: 0.3.10

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In contracts with more than one regular nonpayable function, it is possible to send funds to the default function, even if the default function is marked `nonpayable`. This applies to contracts compiled with vyper versions prior to 0.3.8. This issue was fixed by the removal of the global `calldatasize` check in commit `02339dfda`. Users are advised to upgrade to version 0.3.8. Users unable to upgrade should avoid use of nonpayable default functions. See CVE-2023-32675.


MISC:https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520.: https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520.
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-vxmm-cwh2-q762: https://github.com/vyperlang/vyper/security/advisories/GHSA-vxmm-cwh2-q762

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.3

CVSS v3 Details

MEDIUM 5.3
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
LOW
Availability Availability (A)
NONE