Vulnerability in Vyper Smart Contract Language Allows Incorrect Word-for-Word Comparisons

Vulnerability in Vyper Smart Contract Language Allows Incorrect Word-for-Word Comparisons

CVE-2022-24787 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `"\x00"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds.

Learn more about our Web Application Penetration Testing UK.