Vulnerability Description
A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Greedy599 | Greedy 599 | - |
Related Weaknesses (CWE)
References
- https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877ExploitThird Party Advisory
- https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877ExploitThird Party Advisory
FAQ
What is CVE-2018-17877?
CVE-2018-17877 is a vulnerability with a CVSS score of 7.5 (HIGH). A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() func...
How severe is CVE-2018-17877?
CVE-2018-17877 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-17877?
Check the references section above for vendor advisories and patch information. Affected products include: Greedy599 Greedy 599.