The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
References
Link | Resource |
---|---|
https://etherscan.io/address/0x689FB61845488297dfE7586E5f7956475955d2Dc | Third Party Advisory |
https://etherscan.io/address/0xa44e464b13280340904ffef0a65b8a0033460430 | Third Party Advisory |
https://medium.com/coinmonks/get-legendary-items-by-breaking-pnrg-of-mycyptochamp-an-ethereum-online-game-cve-2018-12855-6e6beb41b8df | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-08-07 15:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-12885
Mitre link : CVE-2018-12885
CVE.ORG link : CVE-2018-12885
JSON object : View
Products Affected
mycryptochamp
- mycryptochamp
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)