Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.
                
            References
                    Configurations
                    History
                    02 Jan 2025, 22:46
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Vyperlang Vyperlang vyper | |
| CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
| CWE | NVD-CWE-Other | |
| References | () https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847 - Product | |
| References | () https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6 - Vendor Advisory | 
21 Nov 2024, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847 - | |
| References | () https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6 - | |
| Summary | 
 | 
25 Apr 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-25 18:15
Updated : 2025-01-02 22:46
NVD link : CVE-2024-32647
Mitre link : CVE-2024-32647
CVE.ORG link : CVE-2024-32647
JSON object : View
Products Affected
                vyperlang
- vyper
CWE
                
                    
                        
                        CWE-95
                        
            Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
NVD-CWE-Other