Vulnerability Description
The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cryptosaga | Cryptosaga | - |
Related Weaknesses (CWE)
References
- https://medium.com/%40jonghyk.song/create-legendary-champs-by-breaking-prng-of-c
- https://medium.com/%40jonghyk.song/create-legendary-champs-by-breaking-prng-of-c
FAQ
What is CVE-2018-12975?
CVE-2018-12975 is a vulnerability with a CVSS score of 7.5 (HIGH). The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash,...
How severe is CVE-2018-12975?
CVE-2018-12975 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12975?
Check the references section above for vendor advisories and patch information. Affected products include: Cryptosaga Cryptosaga.