René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.4 KiB
JSON

{
"id": "CVE-2018-17877",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-10-23T21:30:53.657",
"lastModified": "2018-12-08T02:15:54.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards."
},
{
"lang": "es",
"value": "Una implementaci\u00f3n de contrato inteligente de loter\u00eda para Greedy 599, un token de apuestas de Ethereum, genera un valor aleatorio predecible mediante una llamada externa de contrato. El desarrollador emplea la funci\u00f3n extcodesize() para evitar que se llame un contrato malicioso, pero el atacante puede omitirla escribiendo el c\u00f3digo del n\u00facleo en el constructor de su c\u00f3digo exploit. Por lo tanto, permite que los atacantes ganen siempre y obtengan recompensas."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greedy599:greedy_599:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77788D26-417A-49C7-8C38-12F12FE30898"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}