Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Valid

Vulnerabilities in L1BossBridge contract allow token accumulation through signature reuse

Summary

The L1BossBridge contract lacks recording of used signatures in the sendToL1 function, allowing potential misuse of the same message for multiple transactions.

Vulnerability Details

In the sendToL1 function, there is no restriction on the message, enabling a user to repeatedly trigger the function with the same message, leading to multiple token transfers from L2 to L1.

Impact

Exploiting this vulnerability enables users to accumulate more tokens on the bridge than initially deposited by reusing the same message.

Tools Used

Manual Review

Recommendations

To mitigate this issue, consider implementing one or both of the following:

  1. Update the signers mapping value to false when a user withdraws the token.

  2. Include a nonce value in the signing message and validate the nonce to prevent signature replay attacks.

Updates

Lead Judging Commences

0xnevi Lead Judge almost 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

withdrawTokensToL1()/sendToL1(): signature replay

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.