You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The text was updated successfully, but these errors were encountered:
giansalex
changed the title
BUG: ICS721 attacked by malicious CW721 contract
AWARD: Disperze, ICS721 attacked by malicious CW721 contract
Mar 3, 2023
giansalex
changed the title
AWARD: Disperze, ICS721 attacked by malicious CW721 contract
AWARD: Disperze, cw-ics721 attacked by malicious CW721 contract
Mar 3, 2023
giansalex
changed the title
AWARD: Disperze, cw-ics721 attacked by malicious CW721 contract
BUG: cw-ics721 attacked by malicious CW721 contract
Mar 6, 2023
Summary of Bug
A cw721 contract containing malicious code added to
TransferNft
method, which would then be executed by ICS721 to redeem an NFT (on IBC Rcv).Environment
Ubuntu 20.04.4
[email protected]
.[email protected]
Steps to Reproduce
transfer_nft
handler.Expected and Actual Behavior
Expected: ACK with error for exceeding the gas limit
Actual: Transaction on JUNO (IBC Recv) never completes
Additional Context
This can cause a DoS attack, where relayers are busy trying to execute transactions that cannot be completed.
Malicious cw721 contract
https://blueprints.juno.giansalex.dev/#/contracts/juno1rn6q7hdd95wly4tuun7ffjc4x2rak27twd6ypynlyplpc84um03qqvtq7h
The text was updated successfully, but these errors were encountered: