sherlock-audit / 2024-05-pooltogether-judging

10 stars 6 forks source link

jo13 - Gas Manipulation by Malicious Winners in claimPrizes Function #163

Open sherlock-admin4 opened 4 months ago

sherlock-admin4 commented 4 months ago

jo13

medium

Gas Manipulation by Malicious Winners in claimPrizes Function

Summary

A malicious winner can exploit the claimPrizes function in the Claimer contract by reverting the transaction through returning a huge data chunk. This manipulation can cause the transaction to run out of gas, preventing legitimate claims and allowing the malicious user to claim prizes without computing winners.

Vulnerability Detail

Impact

Recommendation

InfectedIsm commented 3 months ago

Escalate

issue #110 doesn't talk about gas bomb through return data, and shouldn't be a duplicate of this issue. If there's an issue that could be seen as similar, it would be #73, as in that one the attacker steal the reward that was attributed to the original claimer

sherlock-admin3 commented 3 months ago

Escalate

issue #110 doesn't talk about gas bomb through return data, and shouldn't be a duplicate of this issue. If there's an issue that could be seen as similar, it would be #73, as in that one the attacker steal the reward that was attributed to the original claimer

You've created a valid escalation!

To remove the escalation from consideration: Delete your comment.

You may delete or edit your escalation comment anytime before the 48-hour escalation window closes. After that, the escalation becomes final.

nevillehuang commented 3 months ago

Escalation should be rejected, watson didn't pay attention to the correct duplication. #110 is already duplicated to #73

WangSecurity commented 3 months ago

Agree with the Lead Judge, planning to reject the escalation and leave the issue as it is.

WangSecurity commented 3 months ago

Result: Medium Has duplicates

sherlock-admin4 commented 3 months ago

Escalations have been resolved successfully!

Escalation status:

sherlock-admin2 commented 3 months ago

The protocol team fixed this issue in the following PRs/commits: https://github.com/GenerationSoftware/pt-v5-vault/pull/115

10xhash commented 2 months ago

Fixed Now ExcessivelySafeCall is used restricting the return/revert data copying to 128 bytes

sherlock-admin2 commented 2 months ago

The Lead Senior Watson signed off on the fix.