The approveAndCallcode function of a smart contract implementation for Block 18 (18T), an tradable Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer the contract's balances into their account) because the callcode (i.e., _spender.call(_extraData)) is not verified, aka the "evilReflex" issue. NOTE: a PeckShield disclosure states "some researchers have independently discussed the mechanism of such vulnerability."
References
Link | Resource |
---|---|
https://huobiglobal.zendesk.com/hc/en-us/articles/360000110521-HADAX-Suspends-18T-and-GVE-Deposits-and-Withdrawals | Third Party Advisory |
https://peckshield.com/2018/06/23/evilReflex/ | Exploit Third Party Advisory |
https://huobiglobal.zendesk.com/hc/en-us/articles/360000110521-HADAX-Suspends-18T-and-GVE-Deposits-and-Withdrawals | Third Party Advisory |
https://peckshield.com/2018/06/23/evilReflex/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://huobiglobal.zendesk.com/hc/en-us/articles/360000110521-HADAX-Suspends-18T-and-GVE-Deposits-and-Withdrawals - Third Party Advisory | |
References | () https://peckshield.com/2018/06/23/evilReflex/ - Exploit, Third Party Advisory |
Information
Published : 2018-06-25 10:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12703
Mitre link : CVE-2018-12703
CVE.ORG link : CVE-2018-12703
JSON object : View
Products Affected
block18
- block18
CWE
CWE-20
Improper Input Validation