Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4hg4-9mf5-wxxq

Опубликовано: 04 сент. 2023
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

incorrect order of evaluation of side effects for some builtins

Impact

The order of evaluation of the arguments of the builtin functions uint256_addmod, uint256_mulmod, ecadd and ecmul does not follow source order. • For uint256_addmod(a,b,c) and uint256_mulmod(a,b,c), the order is c,a,b. • For ecadd(a,b) and ecmul(a,b), the order is b,a.

Note that this behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on.

Patches

https://github.com/vyperlang/vyper/pull/3583

Workarounds

When using builtins from the list above, make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.

References

Are there any links users can visit to find out more?

Пакеты

Наименование

vyper

pip
Затронутые версииВерсия исправления

<= 0.3.9

0.3.10rc1

EPSS

Процентиль: 21%
0.0007
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-670

Связанные уязвимости

CVSS3: 3.7
nvd
больше 2 лет назад

Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.

EPSS

Процентиль: 21%
0.0007
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-670