Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Valid

withdrawTokensToL1 AllowUnauthorized Token Transfers through Stolen (v, r, s) Value Pairs

Summary

The vulnerability allows a user to potentially take over the (v, r, s) value pair of another user, leading to unauthorized execution of the withdrawTokensToL1 function and consequent token theft.

Vulnerability Details

Exploiting this vulnerability involves stealing the (v, r, s) value pair from another user and triggering the withdrawTokensToL1 function. The current implementation only validates the signer mapping value, allowing successful execution of transferFrom and resulting in token loss.

Impact

The compromised (v, r, s) value pair poses a risk of fund loss, enabling arbitrary users to initiate unauthorized withdrawTokensToL1 transactions.

Tools Used

Manual Review

Recommendations

To address this issue, consider implementing user address validation to ensure that the user initiating the withdrawTokensToL1 transaction is the rightful owner of the tokens. This additional step will enhance security and prevent unauthorized token transfers.

Updates

Lead Judging Commences

0xnevi Lead Judge
almost 2 years ago
0xnevi Lead Judge almost 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

withdrawTokensToL1(): No check for deposits amount

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.