Make Multicall context-aware
This commit is contained in:
5
.changeset/rude-weeks-beg.md
Normal file
5
.changeset/rude-weeks-beg.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
'openzeppelin-solidity': patch
|
||||||
|
---
|
||||||
|
|
||||||
|
`ERC2771Context` and `Context`: Introduce a `_contextPrefixLength()` getter, used to trim extra information appended to `msg.data`.
|
||||||
5
.changeset/strong-points-invent.md
Normal file
5
.changeset/strong-points-invent.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
'openzeppelin-solidity': patch
|
||||||
|
---
|
||||||
|
|
||||||
|
`Multicall`: Make aware of non-canonical context (i.e. `msg.sender` is not `_msgSender()`), allowing compatibility with `ERC2771Context`.
|
||||||
@ -7,6 +7,10 @@ import "../utils/Context.sol";
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* @dev Context variant with ERC2771 support.
|
* @dev Context variant with ERC2771 support.
|
||||||
|
*
|
||||||
|
* WARNING: The usage of `delegatecall` in this contract is dangerous and may result in context corruption.
|
||||||
|
* Any forwarded request to this contract triggering a `delegatecall` to itself will result in an invalid {_msgSender}
|
||||||
|
* recovery.
|
||||||
*/
|
*/
|
||||||
abstract contract ERC2771Context is Context {
|
abstract contract ERC2771Context is Context {
|
||||||
/// @custom:oz-upgrades-unsafe-allow state-variable-immutable
|
/// @custom:oz-upgrades-unsafe-allow state-variable-immutable
|
||||||
@ -21,23 +25,30 @@ abstract contract ERC2771Context is Context {
|
|||||||
return forwarder == _trustedForwarder;
|
return forwarder == _trustedForwarder;
|
||||||
}
|
}
|
||||||
|
|
||||||
function _msgSender() internal view virtual override returns (address sender) {
|
function _msgSender() internal view virtual override returns (address) {
|
||||||
if (isTrustedForwarder(msg.sender) && msg.data.length >= 20) {
|
uint256 calldataLength = msg.data.length;
|
||||||
// The assembly code is more direct than the Solidity version using `abi.decode`.
|
uint256 contextSuffixLength = _contextSuffixLength();
|
||||||
/// @solidity memory-safe-assembly
|
if (isTrustedForwarder(msg.sender) && calldataLength >= contextSuffixLength) {
|
||||||
assembly {
|
return address(bytes20(msg.data[calldataLength - contextSuffixLength:]));
|
||||||
sender := shr(96, calldataload(sub(calldatasize(), 20)))
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
return super._msgSender();
|
return super._msgSender();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function _msgData() internal view virtual override returns (bytes calldata) {
|
function _msgData() internal view virtual override returns (bytes calldata) {
|
||||||
if (isTrustedForwarder(msg.sender) && msg.data.length >= 20) {
|
uint256 calldataLength = msg.data.length;
|
||||||
return msg.data[:msg.data.length - 20];
|
uint256 contextSuffixLength = _contextSuffixLength();
|
||||||
|
if (isTrustedForwarder(msg.sender) && calldataLength >= contextSuffixLength) {
|
||||||
|
return msg.data[:calldataLength - contextSuffixLength];
|
||||||
} else {
|
} else {
|
||||||
return super._msgData();
|
return super._msgData();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @dev ERC-2771 specifies the context as being a single address (20 bytes).
|
||||||
|
*/
|
||||||
|
function _contextSuffixLength() internal view virtual override returns (uint256) {
|
||||||
|
return 20;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -3,10 +3,11 @@
|
|||||||
pragma solidity ^0.8.9;
|
pragma solidity ^0.8.9;
|
||||||
|
|
||||||
import "./ContextMock.sol";
|
import "./ContextMock.sol";
|
||||||
|
import "../utils/Multicall.sol";
|
||||||
import "../metatx/ERC2771Context.sol";
|
import "../metatx/ERC2771Context.sol";
|
||||||
|
|
||||||
// By inheriting from ERC2771Context, Context's internal functions are overridden automatically
|
// By inheriting from ERC2771Context, Context's internal functions are overridden automatically
|
||||||
contract ERC2771ContextMock is ContextMock, ERC2771Context {
|
contract ERC2771ContextMock is ContextMock, ERC2771Context, Multicall {
|
||||||
/// @custom:oz-upgrades-unsafe-allow constructor
|
/// @custom:oz-upgrades-unsafe-allow constructor
|
||||||
constructor(address trustedForwarder) ERC2771Context(trustedForwarder) {
|
constructor(address trustedForwarder) ERC2771Context(trustedForwarder) {
|
||||||
emit Sender(_msgSender()); // _msgSender() should be accessible during construction
|
emit Sender(_msgSender()); // _msgSender() should be accessible during construction
|
||||||
@ -19,4 +20,8 @@ contract ERC2771ContextMock is ContextMock, ERC2771Context {
|
|||||||
function _msgData() internal view override(Context, ERC2771Context) returns (bytes calldata) {
|
function _msgData() internal view override(Context, ERC2771Context) returns (bytes calldata) {
|
||||||
return ERC2771Context._msgData();
|
return ERC2771Context._msgData();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function _contextSuffixLength() internal view override(Context, ERC2771Context) returns (uint256) {
|
||||||
|
return ERC2771Context._contextSuffixLength();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -21,4 +21,8 @@ abstract contract Context {
|
|||||||
function _msgData() internal view virtual returns (bytes calldata) {
|
function _msgData() internal view virtual returns (bytes calldata) {
|
||||||
return msg.data;
|
return msg.data;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function _contextSuffixLength() internal view virtual returns (uint256) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -4,21 +4,36 @@
|
|||||||
pragma solidity ^0.8.0;
|
pragma solidity ^0.8.0;
|
||||||
|
|
||||||
import "./Address.sol";
|
import "./Address.sol";
|
||||||
|
import "./Context.sol";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @dev Provides a function to batch together multiple calls in a single external call.
|
* @dev Provides a function to batch together multiple calls in a single external call.
|
||||||
*
|
*
|
||||||
|
* Consider any assumption about calldata validation performed by the sender may be violated if it's not especially
|
||||||
|
* careful about sending transactions invoking {multicall}. For example, a relay address that filters function
|
||||||
|
* selectors won't filter calls nested within a {multicall} operation.
|
||||||
|
*
|
||||||
|
* NOTE: Since 5.0.1 and 4.9.4, this contract identifies non-canonical contexts (i.e. `msg.sender` is not {_msgSender}).
|
||||||
|
* If a non-canonical context is identified, the following self `delegatecall` appends the last bytes of `msg.data`
|
||||||
|
* to the subcall. This makes it safe to use with {ERC2771Context}. Contexts that don't affect the resolution of
|
||||||
|
* {_msgSender} are not propagated to subcalls.
|
||||||
|
*
|
||||||
* _Available since v4.1._
|
* _Available since v4.1._
|
||||||
*/
|
*/
|
||||||
abstract contract Multicall {
|
abstract contract Multicall is Context {
|
||||||
/**
|
/**
|
||||||
* @dev Receives and executes a batch of function calls on this contract.
|
* @dev Receives and executes a batch of function calls on this contract.
|
||||||
* @custom:oz-upgrades-unsafe-allow-reachable delegatecall
|
* @custom:oz-upgrades-unsafe-allow-reachable delegatecall
|
||||||
*/
|
*/
|
||||||
function multicall(bytes[] calldata data) external virtual returns (bytes[] memory results) {
|
function multicall(bytes[] calldata data) external virtual returns (bytes[] memory results) {
|
||||||
|
bytes memory context = msg.sender == _msgSender()
|
||||||
|
? new bytes(0)
|
||||||
|
: msg.data[msg.data.length - _contextSuffixLength():];
|
||||||
|
|
||||||
results = new bytes[](data.length);
|
results = new bytes[](data.length);
|
||||||
for (uint256 i = 0; i < data.length; i++) {
|
for (uint256 i = 0; i < data.length; i++) {
|
||||||
results[i] = Address.functionDelegateCall(address(this), data[i]);
|
results[i] = Address.functionDelegateCall(address(this), data[i]);
|
||||||
|
results[i] = Address.functionDelegateCall(address(this), bytes.concat(data[i], context));
|
||||||
}
|
}
|
||||||
return results;
|
return results;
|
||||||
}
|
}
|
||||||
|
|||||||
@ -12,7 +12,7 @@ const ContextMockCaller = artifacts.require('ContextMockCaller');
|
|||||||
const { shouldBehaveLikeRegularContext } = require('../utils/Context.behavior');
|
const { shouldBehaveLikeRegularContext } = require('../utils/Context.behavior');
|
||||||
|
|
||||||
contract('ERC2771Context', function (accounts) {
|
contract('ERC2771Context', function (accounts) {
|
||||||
const [, trustedForwarder] = accounts;
|
const [, trustedForwarder, other] = accounts;
|
||||||
|
|
||||||
beforeEach(async function () {
|
beforeEach(async function () {
|
||||||
this.forwarder = await MinimalForwarder.new();
|
this.forwarder = await MinimalForwarder.new();
|
||||||
@ -118,5 +118,58 @@ contract('ERC2771Context', function (accounts) {
|
|||||||
const data = recipient.contract.methods.msgDataShort().encodeABI();
|
const data = recipient.contract.methods.msgDataShort().encodeABI();
|
||||||
await expectEvent(receipt, 'DataShort', { data });
|
await expectEvent(receipt, 'DataShort', { data });
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('multicall poison attack', async function () {
|
||||||
|
const attacker = Wallet.generate();
|
||||||
|
const attackerAddress = attacker.getChecksumAddressString();
|
||||||
|
const nonce = await this.forwarder.getNonce(attackerAddress);
|
||||||
|
|
||||||
|
const msgSenderCall = web3.eth.abi.encodeFunctionCall(
|
||||||
|
{
|
||||||
|
name: 'msgSender',
|
||||||
|
type: 'function',
|
||||||
|
inputs: [],
|
||||||
|
},
|
||||||
|
[],
|
||||||
|
);
|
||||||
|
|
||||||
|
const data = web3.eth.abi.encodeFunctionCall(
|
||||||
|
{
|
||||||
|
name: 'multicall',
|
||||||
|
type: 'function',
|
||||||
|
inputs: [
|
||||||
|
{
|
||||||
|
internalType: 'bytes[]',
|
||||||
|
name: 'data',
|
||||||
|
type: 'bytes[]',
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
[[web3.utils.encodePacked({ value: msgSenderCall, type: 'bytes' }, { value: other, type: 'address' })]],
|
||||||
|
);
|
||||||
|
|
||||||
|
const req = {
|
||||||
|
from: attackerAddress,
|
||||||
|
to: this.recipient.address,
|
||||||
|
value: '0',
|
||||||
|
gas: '100000',
|
||||||
|
data,
|
||||||
|
nonce: Number(nonce),
|
||||||
|
};
|
||||||
|
|
||||||
|
const signature = await ethSigUtil.signTypedMessage(attacker.getPrivateKey(), {
|
||||||
|
data: {
|
||||||
|
types: this.types,
|
||||||
|
domain: this.domain,
|
||||||
|
primaryType: 'ForwardRequest',
|
||||||
|
message: req,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
expect(await this.forwarder.verify(req, signature)).to.equal(true);
|
||||||
|
|
||||||
|
const receipt = await this.forwarder.execute(req, signature);
|
||||||
|
await expectEvent.inTransaction(receipt.tx, ERC2771ContextMock, 'Sender', { sender: attackerAddress });
|
||||||
|
});
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
Reference in New Issue
Block a user