Exploitable Vulnerability: Insecure Random Number Generation in MyCryptoChamp Smart Contract

Exploitable Vulnerability: Insecure Random Number Generation in MyCryptoChamp Smart Contract

CVE-2018-12885 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:N/A:N

The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.

Learn more about our Web Application Penetration Testing UK.