Vulnerability Description
The "PayWinner" function of a simplelottery smart contract implementation for The Ethereum Lottery, an Ethereum gambling game, generates a random value with publicly readable variable "maxTickets" (which is private, yet predictable and readable by the eth.getStorageAt function). Therefore, it allows attackers to always win and get rewards.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Theethereumlottery | The Ethereum Lottery | - |
Related Weaknesses (CWE)
References
- https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-15552ExploitThird Party Advisory
- https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-15552ExploitThird Party Advisory
FAQ
What is CVE-2018-15552?
CVE-2018-15552 is a vulnerability with a CVSS score of 7.5 (HIGH). The "PayWinner" function of a simplelottery smart contract implementation for The Ethereum Lottery, an Ethereum gambling game, generates a random value with publicly readable variable "maxTickets" (wh...
How severe is CVE-2018-15552?
CVE-2018-15552 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-15552?
Check the references section above for vendor advisories and patch information. Affected products include: Theethereumlottery The Ethereum Lottery.