Closed code423n4 closed 1 year ago
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/pods/DelayedWithdrawalRouter.sol#L49
An attacker can watch the mempool , and frontrun the initialize function by providing more transaction gas fees. Doing this , attacker can make himself the owner of the contract, and set malicious delay limits.
initialize
Manual review
OOS --> [L‑06] Upgradeable contract not initialized
0xSorryNotSorry marked the issue as low quality report
GalloDaSballo marked the issue as unsatisfactory: Out of scope
Lines of code
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/pods/DelayedWithdrawalRouter.sol#L49
Vulnerability details
Impact
An attacker can watch the mempool , and frontrun the
initialize
function by providing more transaction gas fees. Doing this , attacker can make himself the owner of the contract, and set malicious delay limits.Proof of Concept
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/pods/DelayedWithdrawalRouter.sol#L49
Tools Used
Manual review