CVE-2018-1000093

CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. This attack appears to be exploitable via a victim visiting a webpage hosting malicious content that trigger such behavior.
References
Link Resource
https://www.ayrx.me/cryptonote-unauthenticated-json-rpc Exploit Third Party Advisory
https://github.com/cryptonotefoundation/cryptonote/issues/172 Exploit Issue Tracking Third Party Advisory
https://github.com/amjuarez/bytecoin/issues/217 Broken Link Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptonote:cryptonote:*:*:*:*:*:*:*:*

Information

Published : 2018-03-13 08:29

Updated : 2018-04-05 14:17


NVD link : CVE-2018-1000093

Mitre link : CVE-2018-1000093


JSON object : View

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

Advertisement

dedicated server usa

Products Affected

cryptonote

  • cryptonote