Status.NICE is the zero-value enum member, so both s_theListCheckedOnce and s_theListCheckedTwice default to NICE for unchecked users. Any unchecked address can call collectPresent() after the time gate and receive an NFT without Santa ever approving them.The intended behavior is that only addresses reviewed by Santa through both checkList() and checkTwice() should be eligible to collect a present. Users marked NICE should receive an NFT, and users marked EXTRA_NICE should receive an NFT plus a SantaToken.
Normal behavior: The intended behavior is that only addresses reviewed by Santa through both checkList() and checkTwice() should be eligible to collect a present.
Problem: Default value for any address - NICE
Likelihood:
Any fresh address automatically satisfies the NICE branch because both mappings return the zero enum value for uninitialized entries.
The exploit only requires waiting until CHRISTMAS_2023_BLOCK_TIME and then calling collectPresent() once from an unchecked address.
Impact:
Any unapproved address can mint an NFT that should only be claimable after Santa performs two matching checks.
This breaks the core access-control logic of the present distribution system and allows unauthorized claims at scale.
Additionally, ensure collectPresent() only accepts explicitly assigned NICE / EXTRA_NICE statuses rather than relying on the default mapping value.
## Description `collectPresent` function is supposed to be called by users that are considered `NICE` or `EXTRA_NICE` by Santa. This means Santa is supposed to call `checkList` function to assigned a user to a status, and then call `checkTwice` function to execute a double check of the status. Currently, the enum `Status` assigns its default value (0) to `NICE`. This means that both mappings `s_theListCheckedOnce` and `s_theListCheckedTwice` consider every existent address as `NICE`. In other words, all users are by default double checked as `NICE`, and therefore eligible to call `collectPresent` function. ## Vulnerability Details The vulnerability arises due to the order of elements in the enum. If the first value is `NICE`, this means the enum value for each key in both mappings will be `NICE`, as it corresponds to `0` value. ## Impact The impact of this vulnerability is HIGH as it results in a flawed mechanism of the present distribution. Any unchecked address is currently able to call `collectPresent` function and mint an NFT. This is because this contract considers by default every address with a `NICE` status (or 0 value). ## Proof of Concept The following Foundry test will show that any user is able to call `collectPresent` function after `CHRISTMAS_2023_BLOCK_TIME` : ``` function testCollectPresentIsFlawed() external { // prank an attacker's address vm.startPrank(makeAddr("attacker")); // set block.timestamp to CHRISTMAS_2023_BLOCK_TIME vm.warp(1_703_480_381); // collect present without any check from Santa santasList.collectPresent(); vm.stopPrank(); } ``` ## Recommendations I suggest to modify `Status` enum, and use `UNKNOWN` status as the first one. This way, all users will default to `UNKNOWN` status, preventing the successful call to `collectPresent` before any check form Santa: ``` enum Status { UNKNOWN, NICE, EXTRA_NICE, NAUGHTY } ``` After modifying the enum, you can run the following test and see that `collectPresent` call will revert if Santa didn't check the address and assigned its status to `NICE` or `EXTRA_NICE` : ``` function testCollectPresentIsFlawed() external { // prank an attacker's address vm.startPrank(makeAddr("attacker")); // set block.timestamp to CHRISTMAS_2023_BLOCK_TIME vm.warp(1_703_480_381); // collect present without any check from Santa vm.expectRevert(SantasList.SantasList__NotNice.selector); santasList.collectPresent(); vm.stopPrank(); } ```
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.