Attacker can make DOS function execute(without quantity parameter).
Summary
Attacker can frontrun the function execute(without quantity parameter).by calling the function execute(with quantity parameter) which may create dos.
Vulnerability Detail
Let assume , for a order, inputAmount = 100e18; outputAmount = 100e18; fillThreshold = 50e17 and order maker has permitted 100e18 inputAmount( in signaturetransfer contract)
A taker calls the function execute(without quantity parameter) to fill the full order.
Attacker frontrun and call the function execute(with quantity param ) with quantity 50e17.
So the taker calling function execute will fail as now order maker has permission 99.5e18 inputAmount.
Impact
If fillThreshold is 0 , then the attacker can create dos with 1 wei.
almurhasan
medium
Attacker can make DOS function execute(without quantity parameter).
Summary
Attacker can frontrun the function execute(without quantity parameter).by calling the function execute(with quantity parameter) which may create dos.
Vulnerability Detail
Let assume , for a order, inputAmount = 100e18; outputAmount = 100e18; fillThreshold = 50e17 and order maker has permitted 100e18 inputAmount( in signaturetransfer contract)
A taker calls the function execute(without quantity parameter) to fill the full order.
Attacker frontrun and call the function execute(with quantity param ) with quantity 50e17.
So the taker calling function execute will fail as now order maker has permission 99.5e18 inputAmount.
Impact
If fillThreshold is 0 , then the attacker can create dos with 1 wei.
Code Snippet
https://github.com/sherlock-audit/2024-02-rubicon-finance/blob/main/gladius-contracts-internal/src/reactors/BaseGladiusReactor.sol#L133
Tool used
Manual Review
Recommendation
Make sure it can’t be dosed