Miggo Logo

GHSA-mr6r-mvw4-736g: Vyper interfaces returning integer types less than 256 bits can be manipulated if uint256 is used

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
3/25/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
vyperpip<= 0.1.0b16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Vyper's type system limitations (lack of uint8 support) and ABI handling, not from specific functions in the Vyper codebase itself. The risk manifests in user-written contracts that interact with external interfaces (e.g., ERC20.decimals()) and store return values into uint256 variables without validation. Since the advisory doesn't identify vulnerable functions within Vyper's implementation but rather describes a language design flaw, no specific functions in the Vyper package can be identified with high confidence. The vulnerability exists in user contract patterns enabled by Vyper's type system, not in Vyper's internal functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# VV*-****-**** **rli*r to**y, w* r***iv** * r*sponsi*l* *is*losur* o* * pot*nti*l issu* *rom @montyly (s**urity r*s**r***r *t @tr*ilo**its) *or Vyp*r us*rs w*o m*k* *ssumptions **out w**t v*lu*s **rt*in int*r**** typ*s **n r*turn. ### Imp**t W* **

Reasoning

T** vuln*r**ility st*ms *rom Vyp*r's typ* syst*m limit*tions (l**k o* uint* support) *n* **I **n*lin*, not *rom sp**i*i* *un*tions in t** Vyp*r *o****s* its*l*. T** risk m*ni**sts in us*r-writt*n *ontr**ts t**t int*r**t wit* *xt*rn*l int*r****s (*.*.