The claim
function in the MerkleAirdrop
contract lacks validation of the address sending the transaction. This oversight allows any party to submit the merkle proof of a user who does not wish to receive the airdrop, potentially leading to unauthorized claims.
This vulnerability enables anyone to force the claim of the airdrop tokens.
Proof of Concept:
To demonstrate the issue, add the following code to the existing MerkleAirdropTest
contract:
foudnry
In the MerkleAirdrop::claim function, validate that the sender is the intended receiver of the airdrop tokens.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.