CVE-2018-17877

A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:greedy599:greedy_599:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 - Exploit, Third Party Advisory () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 - Exploit, Third Party Advisory

Information

Published : 2018-10-23 21:30

Updated : 2024-11-21 03:55


NVD link : CVE-2018-17877

Mitre link : CVE-2018-17877

CVE.ORG link : CVE-2018-17877


JSON object : View

Products Affected

greedy599

  • greedy_599
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)