Closed code423n4 closed 1 year ago
The submission does not provide any demonstration of the issue, reasoning and code blocks.
It's organized by Voting storage voting = votingPerTopic[signerEpoch][topic];
0xSorryNotSorry marked the issue as low quality report
berndartmueller marked the issue as unsatisfactory: Invalid
Lines of code
https://github.com/code-423n4/2023-07-axelar/blob/main/contracts/cgp/governance/InterchainGovernance.sol#L73 https://github.com/code-423n4/2023-07-axelar/blob/main/contracts/cgp/governance/InterchainGovernance.sol#L143 https://github.com/code-423n4/2023-07-axelar/blob/main/contracts/cgp/governance/AxelarServiceGovernance.sol#L53
Vulnerability details
Impact
proposalHash
is calculated from target, callData, and nativeValue. These values can be same if the signer wants to call the same function with same data and value. Using this kind of hash prevents such operations.Proof of Concept
PoC is straightforward.
Tools Used
Manual
Recommended Mitigation Steps
Add
block.timestamp
or salt to hash. Possible to use incremental ID too.Assessed type
call/delegatecall