In L1BossBridge.sol users can call depositTokensToL2 with the from parameters as the address of an arbitrary user.
An attacker can exploit this by sending L1 tokens from another user to himself on L2.
The impact is high since an attacker can listen to users approving the L1Token. He then has a window to call depositTokensToL2 before the said users. It is therefore possible for the attacker to amass a considerable sum on L2.
Since the protocol can be paused, this is not as bad as it could be.
1- Slither static analyzer
2- Forge tests
A simple solution is to remove the from parameter and use msg.sender instead.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.