Closed code423n4 closed 2 years ago
Finding is saying that caller can DOS themselves, at their own expense, to no impact to anyone else
Finding is saying that caller can DOS themselves, at their own expense, to no impact to anyone else
Agree. I'm going to close this as invalid.
The warden is not wrong about the potential but as was pointed out here - the address is an input field for the function being called.
Lines of code
https://github.com/code-423n4/2022-06-nibbl/blob/main/contracts/NibblVault.sol#L454 https://github.com/code-423n4/2022-06-nibbl/blob/main/contracts/NibblVault.sol#L474
Vulnerability details
Impact
Detailed description of the impact of this finding.
I noticed that the withdrawUnsettledBids() and redeem() functions return the Ether amount by calling safeTransferETH, but if the to address passed in is a malicious contract address and the receive() function is implemented inside the contract and revert() is called inside receive. Therefore the transaction will be rolled back. This will lead to some degree of denial of service, so I think we should define a function where the to address acts as a caller to actively claim the Ether amount instead of actively issuing it for it.
Proof of Concept
Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept.
Tools Used
Recommended Mitigation Steps
I think we should define a function where the to address acts as a caller to actively claim the Ether amount instead of actively issuing it for it.