An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function sweep(address _token, uint _amount) returns (bool) { start = 0x123456789; return true;} }. Then, when one calls the function sweep() in the UserWallet contract, it will change the sweeperList to 0X123456789.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/hellowuzekai/blockchains/blob/master/delegatecall.md | Exploit Third Party Advisory | 
| https://github.com/hellowuzekai/blockchains/blob/master/delegatecall.md | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/hellowuzekai/blockchains/blob/master/delegatecall.md - Exploit, Third Party Advisory | 
Information
                Published : 2018-07-16 02:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-14085
Mitre link : CVE-2018-14085
CVE.ORG link : CVE-2018-14085
JSON object : View
Products Affected
                userwallet_project
- userwallet
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
