An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function sweep(address _token, uint _amount) returns (bool) { start = 0x123456789; return true;} }. Then, when one calls the function sweep() in the UserWallet contract, it will change the sweeperList to 0X123456789.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-07-16T02:00:00Z

Updated: 2024-09-16T16:22:39.933Z

Reserved: 2018-07-15T00:00:00Z

Link: CVE-2018-14085

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-16T02:29:00.317

Modified: 2024-11-21T03:48:35.820

Link: CVE-2018-14085

cve-icon Redhat

No data.