Writeup for Denial
- Hello h4ck3r, welcome to the world of smart contract hacking. Solving the challenges from Ethernaut will help you understand Solidity better. Each challenge involves deploying a contract and exploiting its vulnerabilities. If you’re new to Solidity and haven’t deployed a smart contract before, you can learn how to do so using Remix here.
Challenge Description
This is a simple wallet that drips funds over time. You can withdraw the funds slowly by becoming a withdrawing partner.
If you can deny the owner from withdrawing funds when they call withdraw() (while the contract still has funds, and the transaction is of 1M gas or less), you will win this level.
Contract Explanation
If you understand the contract, you can move on to the exploit part. If you’re a beginner, please read the Contract Explanation to gain a better understanding of Solidity.
Click to view source contract
1
2// SPDX-License-Identifier: MIT
3pragma solidity ^0.8.0;
4
5contract Denial {
6 address public partner; // withdrawal partner - pay the gas, split the withdraw
7 address public constant owner = address(0xA9E);
8 uint256 timeLastWithdrawn;
9 mapping(address => uint256) withdrawPartnerBalances; // keep track of partners balances
10
11 function setWithdrawPartner(address _partner) public {
12 partner = _partner;
13 }
14
15 // withdraw 1% to recipient and 1% to owner
16 function withdraw() public {
17 uint256 amountToSend = address(this).balance / 100;
18 // perform a call without checking return
19 // The recipient can revert, the owner will still get their share
20 partner.call{value: amountToSend}("");
21 payable(owner).transfer(amountToSend);
22 // keep track of last withdrawal time
23 timeLastWithdrawn = block.timestamp;
24 withdrawPartnerBalances[partner] += amountToSend;
25 }
26
27 // allow deposit of funds
28 receive() external payable {}
29
30 // convenience function
31 function contractBalance() public view returns (uint256) {
32 return address(this).balance;
33 }
34}
Key Concepts To Learn
In Solidity, we use assert and require to check certain conditions are met or not. But we need to understand the major difference between assert and require.
assert
: This is used to check for conditions that should never occur in a correctly functioning contract. If an assert fails, it indicates a serious issue in the code, such as an internal error or a bug. It is typically used to validate invariants or to check for conditions that should always be true. Below is an example of assert.
require
: This is used for input validation and to ensure certain conditions are met before executing further code. It can check for things like valid user inputs, sufficient funds, or conditions related to external calls. If a require statement fails, it reverts the transaction and provides an error message.
Below is an example that gives much clarity about the usage difference between assert
and require
.
1// SPDX-License-Identifier: MIT
2pragma solidity ^0.8.0;
3
4contract ExampleContract {
5 uint256 public value;
6
7 // Function to set the value with input validation
8 function setValue(uint256 _value) public {
9 // Use require to validate input
10 require(_value > 0, "Value must be greater than 0");
11 value = _value;
12 }
13
14 // Function to increment the value
15 function incrementValue() public {
16 // Use assert to check internal logic
17 uint256 oldValue = value;
18 value += 1;
19
20 // Ensure that value has increased correctly
21 assert(value == oldValue + 1);
22 }
23}
The major difference between assert()
and require()
is that if the condition in require()
fails, it will revert all the changes made and also refund the gas offered for the transaction. But if the assert()
fails, it will consume all the gas and revert all the state changes.
Exploit
Now our task is to make the contract deny the transactions that call the withdraw() function.
1function withdraw() public {
2 uint256 amountToSend = address(this).balance / 100;
3 // perform a call without checking return
4 // The recipient can revert, but the owner will still get their share
5 partner.call{value: amountToSend}("");
6 payable(owner).transfer(amountToSend);
7 // keep track of last withdrawal time
8 timeLastWithdrawn = block.timestamp;
9 withdrawPartnerBalances[partner] += amountToSend;
10 }
If we see the withdraw() function, we can observe that whenever someone calls the withdraw() function, it will send contract balance/100 to the partner as well as the owner. If we set our address as the partner, we will become the partner and it will send the ether.
1function setWithdrawPartner(address _partner) public {
2 partner = _partner;
3}
By calling the above function, we can set the partner to whatever address we pass during the function call.
If we set the partner address as EOA (Externally owned account), it won’t be useful because we can’t reject some one sending ether to our account. We need to write an Exploit
contract, and we need to set the Exploit contract
as the partner.
In general if we want call withdraw() function we need to send some units of gas such that it will be sufficient to execute all the lines in withdraw(). If we send only limited gas the function call will revert.
Since the withdraw() function is making a low-level call during the call, it will send the entire gas (gas required for executing low-level call
as well as gas required to execute the next lines after low-level call
) during the call
. Once the partner transaction is completed, the remaining gas is returned to the withdraw() function, and the remaining gas is used to execute the next lines.
Since the withdraw() function is making a low-level call to the partner (exploit contract), in our exploit contract, if we somehow consume all the gas, then there won’t be enough gas to execute the transfer() function, and it will revert the entire function call of withdraw().
When a contract makes a low-level call to another contract, there should be a receive()
function in the called contract. In the receive()
function, we can write whatever code we want. So if we write an assert()
condition that will always fail, then the assert()
will consume all the gas and revert. The below is the exploit contract.
1// SPDX-License-Identifier: MIT
2pragma solidity ^0.7.0;
3
4
5contract ExploitDenial{
6
7 receive() external payable {
8 assert(false);
9 }
10}
Deploy this contract and open the console and enter the following
What happens if you use revert()
instead of assert()
? Will it revert all the state changes or reverts only the low-level call function? It will revert only call()
function because call is designed in such a way that when it is used if the call is successful it will return true
if the call fails it returns false
. So if we just use revert() it will only revert the call function but the lines after revert will execute normal way unless return value is handled properly.
1> await contract.setWithdrawPartner("YOUR__EXPLOIT__CONTRACT__ADDRESS")
Once the transaction is completed, just submit the instance.
Key Takeaways
The Denial contract is currently using a low-level call to send ether. However, if it were to use the transfer()
or send()
function instead, the exploit described above would not be possible. This is because a low-level call sends the entire gas during the call, whereas send()
and transfer()
only send 2300 units of gas, which is sufficient for the transfer of ether.
If the contract were to use transfer()
, the function would only send 2300 units of gas, which is enough for transferring ether. After the transfer, there wouldn’t be much room for additional operations. If we were to attempt any operations in the receive()
function of our contract, the transfer()
would be reverted. Although the revert would only return false, it wouldn’t have any effect on the main function call.
Comments