Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8cgr-4wgx-xqx4

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

EPSS

Процентиль: 60%
0.00391
Низкий

7.5 High

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 7.5
nvd
больше 7 лет назад

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

EPSS

Процентиль: 60%
0.00391
Низкий

7.5 High

CVSS3

Дефекты

CWE-338