ID CVE-2018-12056
Summary The maxRandom function of a smart contract implementation for All For One, an Ethereum gambling game, generates a random value with publicly readable variables because the _seed value can be retrieved with a getStorageAt call. Therefore, it allows attackers to always win and get rewards.
References
Vulnerable Configurations
  • cpe:2.3:a:all-for-one:all_for_one:-:*:*:*:*:*:*:*
    cpe:2.3:a:all-for-one:all_for_one:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 24-06-2019 - 21:15)
Impact:
Exploitability:
CWE CWE-338
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://medium.com/@jonghyk.song/to-be-a-winner-of-ethereum-gambling-game-all-for-one-by-breaking-prng-1ab011163d40
mlist [zookeeper-notifications] 20190624 [GitHub] [zookeeper] phunt commented on a change in pull request #1001: ZOOKEEPER-3441 OWASP is flagging jackson-databind-2.9.9.jar for CVE-2019-12814
Last major update 24-06-2019 - 21:15
Published 15-08-2018 - 17:29
Last modified 24-06-2019 - 21:15
Back to Top