You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Open call in OracleLess.sol can be used for unauthorized calling
Summary
Users can fill OracleLess order with any pending order ERC20 address and use the open call in OracleLess::execute by filling the order through fillOrder to execute approve and steal all the staked funds.
Root Cause
There is no data validation in fillorder which can be used to pass arbitrary data to OracleLess::execute function and this function performs a open call
1 Attacker checks for the highest staked tokens in OracleLess or any ERC20
2 Then executes a fillOrder function call with txData to call approve function on any ERC-20 token address as target parameter and authorize attacker's address for spending funds
Impact
Stealing of funds
PoC
No response
Mitigation
No response
The text was updated successfully, but these errors were encountered:
Formal Cornflower Halibut
High
Open call in OracleLess.sol can be used for unauthorized calling
Summary
Users can fill OracleLess order with any pending order ERC20 address and use the open call in
OracleLess::execute
by filling the order throughfillOrder
to execute approve and steal all the staked funds.Root Cause
There is no data validation in fillorder which can be used to pass arbitrary data to
OracleLess::execute
function and this function performs a open callInternal pre-conditions
No response
External pre-conditions
No response
Attack Path
1 Attacker checks for the highest staked tokens in OracleLess or any ERC20
2 Then executes a fillOrder function call with
txData
to call approve function on any ERC-20 token address astarget
parameter and authorize attacker's address for spending fundsImpact
Stealing of funds
PoC
No response
Mitigation
No response
The text was updated successfully, but these errors were encountered: