Vulnerability: Predictable Random Number Generation in CryptoSaga Smart Contract

Vulnerability: Predictable Random Number Generation in CryptoSaga Smart Contract

CVE-2018-12975 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

Learn more about our Web Application Penetration Testing UK.