57236 sc medium accesstoken collection front running attack permanent ownership hijack
Description
Vulnerability Overview
Root Cause
function checkAccessTokenInfo(address signer, AccessTokenInfo memory accessTokenInfo) external view {
require(
signer.isValidSignatureNow(
keccak256(
abi.encodePacked(
accessTokenInfo.metadata.name,
accessTokenInfo.metadata.symbol,
accessTokenInfo.contractURI,
accessTokenInfo.feeNumerator,
block.chainid
)
),
accessTokenInfo.signature
),
InvalidSignature()
);
}Attack Flow
Impact
Link to Proof of Concept
Proof of Concept
Prerequisites
Attack Execution
Expected vs Actual Behavior
Recommended Fix
Immediate Fix (Contract Upgrade Required)
Defense-in-Depth Recommendations
References
Previous56867 sc medium signature collision caused counterfeit accesstoken collections with arbitrary name symbol uriNext57884 sc low staking tier manipulation via erc4626 shares slong
Was this helpful?