The fallback function of a simple lottery smart contract implementation for Lucky9io, an Ethereum gambling game, generates a random value with the publicly readable variable entry_number. This variable is private, yet it is readable by eth.getStorageAt function. Also, attackers can purchase a ticket at a low price by directly calling the fallback function with small msg.value, because the developer set the currency unit incorrectly. Therefore, it allows attackers to always win and get rewards.
References
Link | Resource |
---|---|
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17071 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-09-18T21:00:00
Updated: 2018-09-18T20:57:01
Reserved: 2018-09-15T00:00:00
Link: CVE-2018-17071
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-09-18T21:29:03.807
Modified: 2018-12-10T14:53:01.917
Link: CVE-2018-17071
JSON object: View
Redhat Information
No data.
CWE