Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jollytesimal.eth - Replay Attack Vulnerability in relayAccessUpdateBatch function leads to Exposure to Unauthorized contract manipulation #72

Open
sherlock-admin4 opened this issue Sep 13, 2024 · 0 comments

Comments

@sherlock-admin4
Copy link
Contributor

sherlock-admin4 commented Sep 13, 2024

jollytesimal.eth

High

Replay Attack Vulnerability in relayAccessUpdateBatch function leads to Exposure to Unauthorized contract manipulation

Summary

The contract is vulnerable to replay attacks due to missing nonce or replay protection mechanisms.

Vulnerability Detail

An attacker can replay signed transactions, allowing them to manipulate the contract's state.

Impact

An attacker can steal funds or disrupt contract functionality.

Code Snippet

https://github.com/sherlock-audit/2024-08-perennial-v2-update-3/blob/main/perennial-v2/packages/perennial-account/contracts/Controller_Incentivized.sol#L188-L200

Tool used

Manual Review

Recommendation

Implement nonce or replay protection mechanisms, like using a nonce counter or unique identifiers, to prevent replay attacks.

@sherlock-admin3 sherlock-admin3 changed the title Abundant Lace Mammoth - Replay Attack Vulnerability in relayAccessUpdateBatch function leads to Exposure to Unauthorized contract manipulation jollytesimal.eth - Replay Attack Vulnerability in relayAccessUpdateBatch function leads to Exposure to Unauthorized contract manipulation Sep 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant