CVE-2018-12454

The _addguess function of a simplelottery smart contract implementation for 1000 Guess, an Ethereum gambling game, generates a random value with publicly readable variables such as the current block information and a private variable (which can be read with a getStorageAt call). Therefore, it allows attackers to always win and get rewards.
Configurations

Configuration 1 (hide)

cpe:2.3:a:1000guess:1000_guess:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:52

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d', 'name': 'https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d -

Information

Published : 2018-06-17 12:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-12454

Mitre link : CVE-2018-12454

CVE.ORG link : CVE-2018-12454


JSON object : View

Products Affected

1000guess

  • 1000_guess
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)