Risks in DeFi
DeFi projects should not only pay attention to the vulnerabilities related to smart contracts, but the security risks related to non-smart contracts are also fatal to DeFi applications.
Last updated
DeFi projects should not only pay attention to the vulnerabilities related to smart contracts, but the security risks related to non-smart contracts are also fatal to DeFi applications.
Last updated
Front-end Malicious Script: This malicious script will upload users' DASH coin account balance, keystore or private key, seed, and other critical information to a malicious address. A front-end vulnerability refers to a security flaw existing in the user interface or front-end code of a DeFi application, which may result in the theft or manipulation of users' funds or sensitive information by attackers. This includes malicious script injection, cross-site scripting (XSS), clickjacking, and more.
There is an XSS vulnerability in the personal profile name field of a certain trading platform's backend. This vulnerability allows for the injection of malicious scripts.
Step 1 : Intercept the current data packet and insert malicious code after the name kite.
Step 2 : Send data packets, view the status of the current web page, and successfully return the cookie information of the currently logged-in user.
Step 3 : Replace the payload with and wait for the XSS platform to receive it. When a user visits this page, the XSS platform can obtain the victim's user login credentials.
Step 4 : Copy the intercepted cookie and enter the command document.cookie information in the developer mode console to log in the user.
Step 1 : Access URL: https:/xx.com/
Step 2 : Check the cname of xx.com in dashboard-xx.netlify.app.
Step 3 : Create and deploy Nextjs application templates on https://www.netlify.com.
Step 4 : Add an additional subdomain under the Domain Management tab.
Step 5 : xx.com is added to the custom field. This extra subdomain will be set as the "main domain", and the netflix domain will be set as the "default subdomain".
Step 6 : Visit the URL https://xx.com, and its interface is changed to the Nextjs template set earlier.
At this time, the domain name has been successfully maliciously hijacked, which can require users to enter their mnemonic words or private keys, seeking to steal users' personal information and cryptocurrency wallet assets.
After the current user logs in, click My NFT, and you can see that the current user does not have any NFT assets.
Step 1 : Obtain other user addresses in the NFT market, and obtain the current user address from the link: 0xfB67dc...
Step 2 : Go back to my nft interface and click sale to capture the packet.
Step 3 : Replace useraddress with 0xfB67dc31....
Step 4 : Modify the message before sending the data.
Step 5 : Click Collection to obtain data information, and successfully switch to the NFT management background of user 0xfB67dc31..
By modifying the address of the data package, you can successfully exceed the authority to other accounts, and perform arbitrary casting or selling operations on other users' assets.