Closed sherlock-admin4 closed 8 months ago
Escalate
(on behalf of watson) valid issue.
You've deleted an escalation for this issue.
I believe this is a duplicate of https://github.com/sherlock-audit/2024-02-radicalxchange-judging/issues/9 @Hash01011122
AMOW
high
Protocol funds can be stolen through malicious bidding
Summary
Malicious actor can inflate their availableCollateral and withdraw funds on the back of the protocol
Vulnerability Detail
Imagine the following scenario: Malicious actors Bob and Alice, Bob is the current owner of an auctioned NFT. Bob transfers NFT ownership to Alice Alice bids and passes this check Alice pays only feeAmount as collateral (which is a fraction of bidAmount) Alice transfers the NFT back to Bob Alice wins the auction while Bob is NFT owner and the following logic executes
Bob's availableCollateral is incremented by bidAmount despite Alice submitting only a fraction of it as collateral
Impact
Loss of funds
Code Snippet
Tool used
Manual Review
Recommendation
Entire function logic is flawed, needs revision