Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Valid

L1BossBridge.sol#depositTokensToL2 - Malicious user can deposit someone else's token

Summary

The contract allows an attacker to steal user's token after contract approval

Vulnerability Details

The user-controlled input from is not checked if the msg.sender is the from

Impact

A user who has approved this contract and a malicious user can input the user's address as the `from parameter and thereby steal funds from them, which he can then withdraw to himself

Tools Used

Manual Analysis

Recommendations

use msg.sender in place of from

Updates

Lead Judging Commences

0xnevi Lead Judge about 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

depositTokensToL2(): abitrary from address

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.