Boost _ Folks Finance 33687 - [Smart Contract - Medium] Loan creation can be frontrun preventing the
Submitted on Fri Jul 26 2024 12:33:21 GMT-0400 (Atlantic Standard Time) by @Kalogerone for Boost | Folks Finance
Report ID: #33687
Report type: Smart Contract
Report severity: Medium
Target: https://testnet.snowtrace.io/address/0x2cAa1315bd676FbecABFC3195000c642f503f1C9
Impacts:
Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)
Description
Brief/Intro
A user who tries to create a loan has to choose the loanId. Any user can frontrun this transaction with the same loanId, making the initial user's transaction to revert because his selected loanId is taken.
Vulnerability Details
Each loan has a unique bytes32 identifier named loanId. During the loan creation, each user is asked to provide the loanId that his loan will have.
SpokeCommon.sol
function createLoan(
Messages.MessageParams memory params,
bytes32 accountId,
@> bytes32 loanId,
uint16 loanTypeId,
bytes32 loanName
) external payable nonReentrant {
_doOperation(params, Messages.Action.CreateLoan, accountId, abi.encodePacked(loanId, loanTypeId, loanName));
}This arbitrary loanId value is sent through a bridge to the Hub.sol contract which in turn calls the createUserLoan function is LoanManager.sol.
At this point, if there is already a loan with the desired loanId, the transaction reverts. Upon a valid loan creation, a new UserLoan object is created and UserLoan.isActive is set to true.
An attacker can take advantage of this and frontrun all the loan creation transactions (on the chains with a public mempool, like the Ethereum mainnet) and prevent all the users from creating loans.
Impact Details
This is a griefing attack which prevents all users from creating loans. Every transaction will fail because the attacker can frontrun it with the same loanId.
References
https://github.com/Folks-Finance/folks-finance-xchain-contracts/blob/main/contracts/spoke/SpokeCommon.sol#L115
https://github.com/Folks-Finance/folks-finance-xchain-contracts/blob/main/contracts/spoke/SpokeToken.sol#L46
https://github.com/Folks-Finance/folks-finance-xchain-contracts/blob/main/contracts/hub/Hub.sol#L186-L210
https://github.com/Folks-Finance/folks-finance-xchain-contracts/blob/main/contracts/hub/LoanManager.sol#L40
https://github.com/Folks-Finance/folks-finance-xchain-contracts/blob/main/contracts/hub/LoanManagerState.sol#L413
Recommendation
Don't allow for the users to select their desired loanId. Use a counter internally and increment it with every loan creation and use it as the loanId.
Proof of concept
Proof of Concept
Let's follow this scenario:
Bob tries to create a loan with a random
loanIdAlice (the attacker) sees this transaction in the mempool and frontruns bob transaction with the same
loanIdAlice's transaction goes through
Bob's transaction gets reverted
Repeat
Paste the following test in the test/hub/LoanManager.test.ts:
Last updated
Was this helpful?