{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2019-25157","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-17T08:45:34.739Z","datePublished":"2023-12-19T02:00:06.151Z","dateUpdated":"2024-08-05T03:00:19.291Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-19T02:00:06.151Z"},"title":"Ethex Contracts Monthly Jackpot EthexJackpot.sol access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"CWE-284 Improper Access Controls"}]}],"affected":[{"vendor":"Ethex","product":"Contracts","versions":[{"version":"n/a","status":"affected"}],"modules":["Monthly Jackpot Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Ethex Contracts. It has been classified as critical. This affects an unknown part of the file EthexJackpot.sol of the component Monthly Jackpot Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 6b8664b698d3d953e16c284fadc6caeb9e58e3db. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248271."},{"lang":"de","value":"Es wurde eine Schwachstelle in Ethex Contracts ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei EthexJackpot.sol der Komponente Monthly Jackpot Handler. Dank Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar. Der Patch wird als 6b8664b698d3d953e16c284fadc6caeb9e58e3db bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2019-04-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2019-06-26T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2023-12-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-17T09:50:52.000Z","lang":"en","value":"VulDB entry last update"}],"references":[{"url":"https://vuldb.com/?id.248271","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.248271","tags":["signature","permissions-required"]},{"url":"https://bitcointalk.org/index.php?topic=5120151.msg50827730#msg50827730","tags":["related"]},{"url":"https://github.com/ethex-bet/ethex-contracts/commit/6b8664b698d3d953e16c284fadc6caeb9e58e3db","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:00:19.291Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248271","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248271","tags":["signature","permissions-required","x_transferred"]},{"url":"https://bitcointalk.org/index.php?topic=5120151.msg50827730#msg50827730","tags":["related","x_transferred"]},{"url":"https://github.com/ethex-bet/ethex-contracts/commit/6b8664b698d3d953e16c284fadc6caeb9e58e3db","tags":["patch","x_transferred"]}]}]}}