Vulnerability CVE-2022-29255


Published: 2022-06-09

Description:
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4.

Type:

CWE-670

(Always-Incorrect Control Flow Implementation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Vyper project -> Vyper 

 References:
https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38
https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d

Copyright 2024, cxsecurity.com

 

Back to Top