CVE-2018-18920: Py-EVM is vulnerable to arbitrary bytecode injection
(updated )
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with ‘“stack”: [100, 100, 0]’ where b’\x’ was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to “smart contracts can be executed indefinitely without gas being paid.”
References
- github.com/advisories/GHSA-vqgp-4jgj-5j64
- github.com/ethereum/py-evm
- github.com/ethereum/py-evm/issues/1448
- github.com/pypa/advisory-database/tree/main/vulns/py-evm/PYSEC-2018-96.yaml
- nvd.nist.gov/vuln/detail/CVE-2018-18920
- twitter.com/AlexanderFisher/status/1060923428641878019
- twitter.com/NettaLab/status/1060889400102383617
- www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx
Detect and mitigate CVE-2018-18920 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →