{"id":60127,"date":"2022-04-14T16:24:17","date_gmt":"2022-04-14T13:24:17","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=60127"},"modified":"2025-09-05T01:37:46","modified_gmt":"2025-09-04T22:37:46","slug":"rarible-vulnerability-could-have-allowed-theft-of-all-nfts-from-a-users-wallet","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/rarible-vulnerability-could-have-allowed-theft-of-all-nfts-from-a-users-wallet\/","title":{"rendered":"Rarible vulnerability could have allowed theft of all NFTs from a user&#8217;s wallet"},"content":{"rendered":"<p>Security researchers at Check Point Research (CPR) <a href=\"https:\/\/blog.checkpoint.com\/2022\/04\/14\/security-flaw-in-rarible-the-nft-marketplace-with-over-2m-monthly-active-users-could-have-led-to-theft-of-crypto-wallets\/\">discovered<\/a> a vulnerability in the NFT marketplace Rarible. The exploit would have allowed an attacker to drain all assets from the wallet of any of the platform&#8217;s two million users in a single transaction.<\/p>\n<p>A successful attack could be carried out using a malicious NFT on the platform. In such cases, users would be less suspicious and familiar with the process of sending transactions, experts noted.<\/p>\n<p>CPR described the probable methodology of the attack as follows:<\/p>\n<ul class=\"wp-block-list\">\n<li>The victim receives a link to a token containing a script or clicks it while browsing the marketplace;<\/li>\n<li>The JavaScript code being executed attempts to issue a setApprovalForAll request to the user;<\/li>\n<li>The victim approves it and grants the attacker full access to their assets.<\/li>\n<\/ul>\n<p>According to the experts, their motivation to test OpenSea&#8217;s security for such an attack was that they had already faced a similar incident. On April 1, the Taiwanese singer Jay Chou was tricked into confirming a transaction, after which his NFT Bored Ape #3738 was sold on the marketplace for $500,000.<\/p>\n<p>CPR also drew on the results of their study of the OpenSea marketplace in October 2021, during which they uncovered critical vulnerabilities.<\/p>\n<p>According to the blog, on April 5 the company informed the Rarible team of its findings, which &#8220;acknowledged the bug and fixed it&#8221;.<\/p>\n<p>Nevertheless, experts advised users to be cautious when receiving requests even on the marketplace itself. If in doubt, they recommended rejecting such offers.<\/p>\n<p>In January, a <a href=\"https:\/\/forklog.com\/en\/news\/opensea-vulnerability-nets-user-347-eth\">vulnerability was discovered<\/a> in OpenSea&#8217;s listing function, which allowed tokens to be purchased at a discounted price. Only one user, through the <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> of the marketplace on Rarible, obtained 347 ETH through the manipulation.<\/p>\n<p>Total losses <a href=\"https:\/\/forklog.com\/en\/news\/opensea-reimbursed-users-affected-by-a-vulnerability-to-more-than-1-9-million\">amounted to 750 ETH<\/a>, which OpenSea reimbursed to customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers at Check Point Research (CPR) discovered a vulnerability in the NFT marketplace Rarible. The exploit would have allowed an attacker to drain all assets from the wallet of any of the platform&#8217;s two million users in a single transaction.<\/p>\n","protected":false},"author":1,"featured_media":60128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1301,1213,2206],"class_list":["post-60127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-blockchain-vulnerabilities","tag-nft","tag-rarible"],"aioseo_notices":[],"amp_enabled":true,"views":"19","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/60127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=60127"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/60127\/revisions"}],"predecessor-version":[{"id":60129,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/60127\/revisions\/60129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/60128"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=60127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=60127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=60127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}