The executeMetaTransaction
function in the contract lacks thorough and strict validation of the functionSignature
passed in. This could allow an attacker to provide an invalid or malicious functionSignature
, leading to the execution of unwanted functions or attacks on the contract. Without a mechanism to validate the functionSignature
, security vulnerabilities may arise, causing harm to the system or users.
In the executeMetaTransaction
function, the functionSignature
is passed in without any validation of its validity. Specifically, the functionSignature
is concatenated with the user's address in the call instruction:
This means that an attacker could send any value for the functionSignature
, including malicious commands or requests to call unwanted functions within the contract. Although the contract executes the call with the functionSignature
, there is no mechanism in place to validate the functionSignature
before execution.
Without thorough validation of the functionSignature
, an attacker could easily call unwanted functions.
Manual
Add an additional layer of verification to ensure that the functionSignature
only contains valid signatures of functions within the contract.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.