The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
References
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255 - |
07 Nov 2023, 02:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-09-24 22:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12975
Mitre link : CVE-2018-12975
CVE.ORG link : CVE-2018-12975
JSON object : View
Products Affected
cryptosaga
- cryptosaga
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)