CVE-2018-12885

The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mycryptochamp:mycryptochamp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
References () https://etherscan.io/address/0x689FB61845488297dfE7586E5f7956475955d2Dc - Third Party Advisory () https://etherscan.io/address/0x689FB61845488297dfE7586E5f7956475955d2Dc - Third Party Advisory
References () https://etherscan.io/address/0xa44e464b13280340904ffef0a65b8a0033460430 - Third Party Advisory () https://etherscan.io/address/0xa44e464b13280340904ffef0a65b8a0033460430 - Third Party Advisory
References () https://medium.com/coinmonks/get-legendary-items-by-breaking-pnrg-of-mycyptochamp-an-ethereum-online-game-cve-2018-12855-6e6beb41b8df - Exploit, Third Party Advisory () https://medium.com/coinmonks/get-legendary-items-by-breaking-pnrg-of-mycyptochamp-an-ethereum-online-game-cve-2018-12855-6e6beb41b8df - Exploit, Third Party Advisory

Information

Published : 2018-08-07 15:29

Updated : 2024-11-21 03:46


NVD link : CVE-2018-12885

Mitre link : CVE-2018-12885

CVE.ORG link : CVE-2018-12885


JSON object : View

Products Affected

mycryptochamp

  • mycryptochamp
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)