Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40769 PoC — profanity 安全特征问题漏洞

Source
Associated Vulnerability
Title:profanity 安全特征问题漏洞 (CVE-2022-40769)
Description:profanity是BlackTrace个人开发者的一个以太坊的虚名地址生成器。 profanity 1.60及之前的版本存在安全漏洞,该漏洞源于其只有40亿个可能的RNG初始化导致攻击者可以从以太坊虚荣地址恢复私钥,并窃取加密货币。
Description
profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice
Readme
# CVE-2022-40769

profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.

| authentication | complexity | vector |
| --- | --- | --- |
| not available | not available | not available |

| confidentiality | integrity | availability |
| --- | --- | --- |
| not available | not available | not available |

## CVSS Score: **not available**

## References

* https://github.com/johguse/profanity/issues/61

* https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c

* https://github.com/johguse/profanity

## Brut File

* [CVE-2022-40769.json](./data_brut.json)



## About this repository
This repository is part of the project [Live Hack CVE](https://github.com/Live-Hack-CVE). Made by [Sn0wAlice](https://github.com/Sn0wAlice) for the people that care about security and need to have a feed of the latest CVEs. Hope you enjoy it, don't forget to star the repo and follow me on [Twitter](https://twitter.com/Sn0wAlice) and [Github](https://github.com/Sn0wAlice)
File Snapshot

[4.0K] /data/pocs/83e4565b1c78d840912537a8a76af57006e66a94 ├── [8.6K] data_brut.json └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.