Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0184 Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.\n
Github GHSA Github GHSA GHSA-3whq-64q2-qfj6 vyper performs double eval of raw_args in create_from_blueprint
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Jan 2025 23:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T02:13:40.122Z

Reserved: 2024-04-16T14:15:26.875Z

Link: CVE-2024-32647

cve-icon Vulnrichment

Updated: 2024-04-30T15:56:18.347Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-25T18:15:08.963

Modified: 2025-01-02T22:46:37.853

Link: CVE-2024-32647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.