Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

0xlookman - Signatures used in EPProgramManager.sol::updateUserUnits in vulnerability to cross chain signature replys. #73

Open
sherlock-admin3 opened this issue Nov 24, 2024 · 0 comments

Comments

@sherlock-admin3
Copy link
Contributor

sherlock-admin3 commented Nov 24, 2024

0xlookman

Medium

Signatures used in EPProgramManager.sol::updateUserUnits in vulnerability to cross chain signature replys.

Summary

The suite is going to be deployed multiple chains. Signatures are used in EPProgramManager.sol::updateUserUnits when updating units of users but these signatures are not protected against cross chain signature replys.

Root Cause

Lack of protection against cross chain signature replys.

Internal pre-conditions

A chain id is not applied in the signature hash yet it's to be deployed on multiple contracts.

External pre-conditions

No response

Attack Path

A user subscribed to a different programme decides to reuse a signed message on a different chain to get more units.

Impact

Unauthorized increase of users units across chains.

PoC

Mitigation

Consider using the chain id in the signature hash.

@sherlock-admin2 sherlock-admin2 changed the title Quaint Ultraviolet Cheetah - Signatures used in EPProgramManager.sol::updateUserUnits in vulnerability to cross chain signature replys. 0xlookman - Signatures used in EPProgramManager.sol::updateUserUnits in vulnerability to cross chain signature replys. Nov 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant