The approveAndCallcode function of a smart contract implementation for Block 18 (18T), an tradable Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer the contract's balances into their account) because the callcode (i.e., _spender.call(_extraData)) is not verified, aka the "evilReflex" issue. NOTE: a PeckShield disclosure states "some researchers have independently discussed the mechanism of such vulnerability."
References
Link | Resource |
---|---|
https://huobiglobal.zendesk.com/hc/en-us/articles/360000110521-HADAX-Suspends-18T-and-GVE-Deposits-and-Withdrawals | Third Party Advisory |
https://peckshield.com/2018/06/23/evilReflex/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-25T10:00:00
Updated: 2018-06-25T10:57:01
Reserved: 2018-06-23T00:00:00
Link: CVE-2018-12703
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-25T10:29:00.267
Modified: 2018-08-30T13:16:41.657
Link: CVE-2018-12703
JSON object: View
Redhat Information
No data.
CWE