CVE-2018-14085

An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function sweep(address _token, uint _amount) returns (bool) { start = 0x123456789; return true;} }. Then, when one calls the function sweep() in the UserWallet contract, it will change the sweeperList to 0X123456789.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:userwallet_project:userwallet:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-16 02:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-14085

Mitre link : CVE-2018-14085

CVE.ORG link : CVE-2018-14085


JSON object : View

Products Affected

userwallet_project

  • userwallet
CWE
CWE-20

Improper Input Validation