The depositTokensToL2
function in L1BossBridge
has a vulnerability where the from address is not strictly controlled, allowing an attacker to potentially exploit it. An attacker could deploy a malicious contract, call the vulnerable function with a manipulated from
address, and execute arbitrary code, leading to financial losses and disruption of the contract's operation.
Alice approves this contract to spend her ERC20 tokens. Bob can call and specify Alice's address as the from parameter in safetransferFrom, allowing him to transfer Alice's tokens to himself.
Slither
Foundry
Use msg.sender
as from in safetransferFrom
.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.