Vulnerability CVE-2018-12885


Published: 2018-08-07

Description:
The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.

Type:

CWE-338

(Use of Cryptographically Weak PRNG)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Mycryptochamp -> Mycryptochamp 

 References:
https://etherscan.io/address/0x689FB61845488297dfE7586E5f7956475955d2Dc
https://etherscan.io/address/0xa44e464b13280340904ffef0a65b8a0033460430
https://medium.com/coinmonks/get-legendary-items-by-breaking-pnrg-of-mycyptochamp-an-ethereum-online-game-cve-2018-12855-6e6beb41b8df

Copyright 2024, cxsecurity.com

 

Back to Top