sherlock-audit / 2024-09-orderly-network-solana-contract-judging

0 stars 0 forks source link

Silly Amber Shell - An attacker can repeatedly DoS `SolConnector` by sending maliciously deposit requests #122

Open sherlock-admin4 opened 4 days ago

sherlock-admin4 commented 4 days ago

Silly Amber Shell

Medium

An attacker can repeatedly DoS SolConnector by sending maliciously deposit requests

Summary

If SolConnector::_lzReceive reverts for any reason (e.g when calling ledger.accountDepositSol), the Solana Endpoint outbound nonce will be desync'd with the SolConnector internal nonce checker. This state can be repeatedly activated by the attacker by sending incorrect AccountDepositSol (vault_deposit_params on the Solana side) to the ledger.

Root Cause

Internal pre-conditions

External pre-conditions

Attack Path

Impact

Repeated/continous DoS of SolConnector

PoC

No response

Mitigation

Consider changing for an unordered delivery mechanism on SolConnector, or requesting a minimum deposit of token_amount in solana-vault::deposit