In Solidity versions prior to 0.8.0, integers were subject to integer overflows.
Likelihood:
Any arithmetic operation (+, -, *, ++, --, +=, -=, *=) on uint or int types triggers this behavior automatically without compiler warnings in Solidity <0.8.0.
Attackers can craft transactions with large numbers (e.g., amount = balances[msg.sender] + 1 for subtraction) to force underflow or overflow, requiring no special privileges or external conditions.
Impact:
An attacker can drain tokens from a contract by causing underflow in balance checks—e.g., transferring more tokens than owned wraps around, allowing the require to pass and the balance to become astronomically large.
The contract's total supply invariants break, leading to minting of unlimited tokens (through overflow) or locking of funds (through underflow), making the token worthless and enabling theft of Ether or ERC-20 tokens from the contract.
We first conclude a raffle of 4 players to collect some fees.
We then have 89 additional players enter a new raffle, and we conclude that raffle as well.
totalFees will be:
You will now not be able to withdraw, due to this line in PuppyRaffle::withdrawFees:
Although you could use selfdestruct To send ETH to this contract in order for the values to match and withdraw the fees, this is clearly not what the protocol is intended to do.
There are a few recommended mitigations here.
Use a newer version of Solidity that does not allow integer overflows by default.
Alternatively, if you want to use an older version of Solidity, you can use a library like OpenZeppelin's SafeMath to prevent integer overflows.
Use a uint256 instead of a uint64 for totalFees.
Remove the balance check in PuppyRaffle::withdrawFees
## Description ## Vulnerability Details The type conversion from uint256 to uint64 in the expression 'totalFees = totalFees + uint64(fee)' may potentially cause overflow problems if the 'fee' exceeds the maximum value that a uint64 can accommodate (2^64 - 1). ```javascript totalFees = totalFees + uint64(fee); ``` ## POC <details> <summary>Code</summary> ```javascript function testOverflow() public { uint256 initialBalance = address(puppyRaffle).balance; // This value is greater than the maximum value a uint64 can hold uint256 fee = 2**64; // Send ether to the contract (bool success, ) = address(puppyRaffle).call{value: fee}(""); assertTrue(success); uint256 finalBalance = address(puppyRaffle).balance; // Check if the contract's balance increased by the expected amount assertEq(finalBalance, initialBalance + fee); } ``` </details> In this test, assertTrue(success) checks if the ether was successfully sent to the contract, and assertEq(finalBalance, initialBalance + fee) checks if the contract's balance increased by the expected amount. If the balance didn't increase as expected, it could indicate an overflow. ## Impact This could consequently lead to inaccuracies in the computation of 'totalFees'. ## Recommendations To resolve this issue, you should change the data type of `totalFees` from `uint64` to `uint256`. This will prevent any potential overflow issues, as `uint256` can accommodate much larger numbers than `uint64`. Here's how you can do it: Change the declaration of `totalFees` from: ```javascript uint64 public totalFees = 0; ``` to: ```jasvascript uint256 public totalFees = 0; ``` And update the line where `totalFees` is updated from: ```diff - totalFees = totalFees + uint64(fee); + totalFees = totalFees + fee; ``` This way, you ensure that the data types are consistent and can handle the range of values that your contract may encounter.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.