Vulnerability Details : CVE-2018-17877
Potential exploit
A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
Products affected by CVE-2018-17877
- cpe:2.3:a:greedy599:greedy_599:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-17877
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-17877
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-17877
-
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-17877
-
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877
CVE-LIST/CVE-2018-17877 at master · TEAM-C4B/CVE-LIST · GitHubExploit;Third Party Advisory
Jump to