CVE-2018-12975

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptosaga:cryptosaga:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:52

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255', 'name': 'https://medium.com/@jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255 -

Information

Published : 2018-09-24 22:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-12975

Mitre link : CVE-2018-12975

CVE.ORG link : CVE-2018-12975


JSON object : View

Products Affected

cryptosaga

  • cryptosaga
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)