Platform: Code4rena
Start Date: 04/03/2024
Pot Size: $140,000 USDC
Total HM: 19
Participants: 69
Period: 21 days
Judge: 0xean
Total Solo HM: 4
Id: 343
League: ETH
Rank: 16/69
Findings: 1
Award: $1,503.18
🌟 Selected for report: 0
🚀 Solo Findings: 0
🌟 Selected for report: lightoasis
Also found by: 0xleadwizard, Tendency, alexfilippov314, ladboy233, wangxx2026
1503.1753 USDC - $1,503.18
A signature replay attack is possible, which leads to the withdrawal of user funds.
function withdraw(address _to, bytes memory _sig) external { if (_to == address(0)) revert INVALID_PARAM(); bytes32 hash = keccak256(abi.encodePacked("Withdraw unlocked Taiko token to: ", _to)); address recipient = ECDSA.recover(hash, _sig); _withdraw(recipient, _to); }
No nonce is used in the hash
Flow of the attack:
A nonce should be used while constructing hash.
Invalid Validation
#0 - c4-pre-sort
2024-03-28T18:50:46Z
minhquanym marked the issue as duplicate of #60
#1 - c4-judge
2024-04-10T11:21:09Z
0xean marked the issue as satisfactory