This Vulnerability arises when a user, instead of using EggHuntGame::depositEggToVault
directly calls EggVault::depositEgg
, to depsoit the NFT into the vault.
User will first transfer the NFT to EggVault in first transaction and then directly call depositEgg
with its own address in the second transaction, attacker can backrun the first transaction and call depositEgg
with its address to set him owner of the NFT and then he can withdraw the NFT by calling EggVault::withdrawEgg
.
Attack can steal victim's NFT by backrunning his transfer NFT function
Front-running depositEgg allows deposit ownership hijacking.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.