Skip to content

Vyper's `_abi_decode` input not validated in complex expressions

Moderate severity GitHub Reviewed Published Sep 26, 2023 in vyperlang/vyper • Updated Nov 9, 2023

Package

pip vyper (pip)

Affected versions

>= 0.3.4, < 0.3.10

Patched versions

0.3.10

Description

Impact

_abi_decode() does not validate input when it is nested in an expression. the following example gets correctly validated (bounds checked):

x: int128 = _abi_decode(slice(msg.data, 4, 32), int128)

however, the following example is not bounds checked

@external
def abi_decode(x: uint256) -> uint256:
    a: uint256 = convert(_abi_decode(slice(msg.data, 4, 32), (uint8)), uint256) + 1
    return a  # abi_decode(256) returns: 257

the issue can be triggered by constructing an example where the output of _abi_decode is not internally passed to make_setter (an internal codegen routine) or other input validating routine.

Patches

vyperlang/vyper#3626

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

References

Are there any links users can visit to find out more?

References

@charles-cooper charles-cooper published to vyperlang/vyper Sep 26, 2023
Published to the GitHub Advisory Database Sep 26, 2023
Reviewed Sep 26, 2023
Published by the National Vulnerability Database Sep 27, 2023
Last updated Nov 9, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2023-42460

GHSA ID

GHSA-cx2q-hfxr-rj97

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.