Akropolis 重入攻击分析

本文详细分析了一起利用智能合约重入攻击的案例,涉及合约函数deposit的潜在风险。攻击者可通过创建自定义合约,在deposit调用过程中反复触发自身,改变deposit参数,导致超额mint PoolToken并提取超额抵押的代币。此攻击揭示了智能合约在处理跨合约交互时的安全漏洞,强调了代码审计和安全实践的重要性。
摘要由CSDN通过智能技术生成

攻击交易:
https://etherscan.io/tx/0xddf8c15880a20efa0f3964207d345ff71fbb9400032b5d33b9346876bd131dc2
https://oko.palkeo.com/0xddf8c15880a20efa0f3964207d345ff71fbb9400032b5d33b9346876bd131dc2/
合约代码:
https://etherscan.io/address/0x1cec0e358f882733c5ecc028d8a0c24baee02004#code
https://etherscan.io/address/0x9a280f81b0c6959061715370ec0eb7720ce1f002#code
函数deposit

function deposit(address _protocol, address[] memory _tokens, uint256[] memory _dnAmounts)
    public operationAllowed(IAccessModule.Operation.Deposit)
    returns(uint256) 
    {
        //distributeRewardIfRequired(_protocol);
        uint256 nAmount;
        for (uint256 i=0; i < _tokens.length; i++) {
            nAmount = nAmount.add(normalizeTokenAmount(_tokens[i], _dnAmounts[i]));
        }
        uint256 nBalanceBefore = distributeYieldInternal(_protocol);
        depositToProtocol(_protocol, _tokens, _dnAmounts);
        uint256 nBalanceAfter = updateProtocolBalance(_protocol);
        PoolToken poolToken = PoolToken(protocols[_protocol].poolToken);
        uint256 nDeposit = nBalanceAfter.sub(nBalanceBefore);
        uint256 cap;
        if(userCapEnabled) {
            cap = userCap(_protocol, _msgSender());
        }
        uint256 fee;
        if(nAmount > nDeposit) {
            fee = nAmount - nDeposit;
            poolToken.mint(_msgSender(), nDeposit);
        } else {
            fee = 0;
            poolToken.mint(_msgSender(), nAmount);
            uint256 yield = nDeposit - nAmount;
            if (yield > 0) {
                //Additional Yield received from protocol (because of lottery, or something)
                createYieldDistribution(poolToken, yield);
            }
        }
    .......
    function depositToProtocol(address _protocol, address[] memory _tokens, uint256[] memory _dnAmounts) internal {
        require(_tokens.length == _dnAmounts.length, "SavingsModule: count of tokens does not match count of amounts");
        for (uint256 i=0; i < _tokens.length; i++) {
            address tkn = _tokens[i];
            IERC20(tkn).safeTransferFrom(_msgSender(), _protocol, _dnAmounts[i]);
            IDefiProtocol(_protocol).handleDeposit(tkn, _dnAmounts[i]);
            emit DepositToken(_protocol, tkn, _dnAmounts[i]);
        }
    }

函数deposit存在重入攻击,并且在调用token.safeTransferFrom后判断存入多少已经存在合约_protocol中的_registeredTokens数量根据数量计算mint数量,而在_protocol合约中函数handleDeposit对不在列表_registeredTokens中的合约依旧执行,

function handleDeposit(address token, uint256 amount) public onlyDefiOperator {
        uint256[] memory amounts = new uint256[](nCoins());
        for (uint256 i=0; i < _registeredTokens.length; i++){
            amounts[i] = IERC20(_registeredTokens[i]).balanceOf(address(this)); // Check balance which is left after previous withdrawal
            //amounts[i] = (_registeredTokens[i] == token)?amount:0;
            if (_registeredTokens[i] == token) {
                require(amounts[i] >= amount, "CurveFiYProtocol: requested amount is not deposited");
            }
        }
        deposit_add_liquidity(amounts, 0);
        stakeCurveFiToken();
    }

所以可以通过自己创建合约并在safetransfer函数中继续调用deposit并且在最后一次deposit时修改deposit参数为合约_protocol_registeredTokens存在的目标token(提前授权)同时每次deposit的normalizeTokenAmount(_dnAmounts)都要大于目标token的normalizeTokenAmount(_dnAmounts) 在执行后会成倍mint pooltoken再调用withdraw取回目标token会成倍提取质押的目标token。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值