CVE-2018-15552

The "PayWinner" function of a simplelottery smart contract implementation for The Ethereum Lottery, an Ethereum gambling game, generates a random value with publicly readable variable "maxTickets" (which is private, yet predictable and readable by the eth.getStorageAt function). Therefore, it allows attackers to always win and get rewards.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:theethereumlottery:the_ethereum_lottery:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-15552 - Exploit, Third Party Advisory () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-15552 - Exploit, Third Party Advisory

Information

Published : 2018-09-07 22:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15552

Mitre link : CVE-2018-15552

CVE.ORG link : CVE-2018-15552


JSON object : View

Products Affected

theethereumlottery

  • the_ethereum_lottery
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)