Closed code423n4 closed 2 years ago
Lacking any specifics, believe it to be unsatisfactory.
0xean marked the issue as duplicate
The submission does not explain a DOS vector properly and is not on par with the rest of the dups, imo.
0xean marked the issue as satisfactory
0xean changed the severity to 2 (Med Risk)
Lines of code
https://github.com/code-423n4/2022-11-size/blob/969b9591b89ab21dcc9a13925809696dcaf43938/src/SizeSealed.sol#L347
Vulnerability details
Impact
Attacker can fill up all the bids and steal and be the winner and cause a dos and then withdraw/refund the funds since when doing a refund the bid isn't taken off the array an attacker can make 1000 bids and cause dos and have 100 percent chance of winning causing a loss of funds
Proof of Concept
There is no fee taken on the amount and there can be dos and it should be removed.
and no array slot popped off which can be filled causing 100 percent winnings for the bidder they are able to get all the bid amounts out and even if they don't win they cant dos the whole auction and still get their funds out with no punishment.
Tools Used
Recommended Mitigation Steps
remove the bid from an array or check the address