The vulnerability allows a user to potentially take over the (v, r, s) value pair of another user, leading to unauthorized execution of the withdrawTokensToL1
function and consequent token theft.
Exploiting this vulnerability involves stealing the (v, r, s) value pair from another user and triggering the withdrawTokensToL1
function. The current implementation only validates the signer
mapping value, allowing successful execution of transferFrom
and resulting in token loss.
The compromised (v, r, s) value pair poses a risk of fund loss, enabling arbitrary users to initiate unauthorized withdrawTokensToL1
transactions.
Manual Review
To address this issue, consider implementing user address validation to ensure that the user initiating the withdrawTokensToL1
transaction is the rightful owner of the tokens. This additional step will enhance security and prevent unauthorized token transfers.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.