The approveAndCallcode function of a smart contract implementation for Block 18 (18T), an tradable Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer the contract's balances into their account) because the callcode (i.e., _spender.call(_extraData)) is not verified, aka the "evilReflex" issue. NOTE: a PeckShield disclosure states "some researchers have independently discussed the mechanism of such vulnerability."
References
Link | Resource |
---|---|
https://huobiglobal.zendesk.com/hc/en-us/articles/360000110521-HADAX-Suspends-18T-and-GVE-Deposits-and-Withdrawals | Third Party Advisory |
https://peckshield.com/2018/06/23/evilReflex/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-25 10:29
Updated : 2018-08-30 13:16
NVD link : CVE-2018-12703
Mitre link : CVE-2018-12703
CVE.ORG link : CVE-2018-12703
JSON object : View
Products Affected
block18
- block18
CWE
CWE-20
Improper Input Validation