CVE-2024-32645

April 25, 2024, 6:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Vyper

  • 0.3.10 and prior

Source

security-advisories@github.com

Tags

CVE-2024-32645 details

Published : April 25, 2024, 6:15 p.m.
Last Modified : April 25, 2024, 6:15 p.m.

Description

Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available.

CVSS Score

1 2 3 4 5.3 6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

Base Score

5.3

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.