A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
References
Link | Resource |
---|---|
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 | Exploit Third Party Advisory |
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 - Exploit, Third Party Advisory |
Information
Published : 2018-10-23 21:30
Updated : 2024-11-21 03:55
NVD link : CVE-2018-17877
Mitre link : CVE-2018-17877
CVE.ORG link : CVE-2018-17877
JSON object : View
Products Affected
greedy599
- greedy_599
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)