Closed howlbot-integration[bot] closed 3 months ago
koolexcrypto marked the issue as duplicate of #18
koolexcrypto changed the severity to 3 (High Risk)
koolexcrypto changed the severity to 2 (Med Risk)
koolexcrypto marked the issue as partial-50
koolexcrypto changed the severity to 3 (High Risk)
koolexcrypto marked the issue as duplicate of #33
koolexcrypto marked the issue as not a duplicate
koolexcrypto changed the severity to QA (Quality Assurance)
koolexcrypto marked the issue as grade-c
Lines of code
https://github.com/code-423n4/2024-05-loop/blob/main/src/PrelaunchPoints.sol#L262
Vulnerability details
Impact
If someone accidentally sends ETH directly to the PrelaunchPoints contract, a user could potentially detect this and call the
_claim
function to gain more tokens than they originally provided token for. Essentially, they could claim tokens for more than they deposited.Proof of Concept
https://github.com/code-423n4/2024-05-loop/blob/main/src/PrelaunchPoints.sol#L262
Tools Used
Manual review
Recommended Mitigation Steps
To prevent this, it's recommended to modify the
_fillQuote
function to return the actual amount of ETH. This claimed amount should then be used to deposit.https://github.com/code-423n4/2024-05-loop/blob/main/src/PrelaunchPoints.sol#L491~L505
Assessed type
ETH-Transfer