Ondo Finance - Delvir0's results

Institutional-Grade Finance. On-Chain. For Everyone.

General Information

Platform: Code4rena

Start Date: 01/09/2023

Pot Size: $36,500 USDC

Total HM: 4

Participants: 70

Period: 6 days

Judge: kirk-baird

Id: 281

League: ETH

Ondo Finance

Findings Distribution

Researcher Performance

Rank: 15/70

Findings: 1

Award: $771.30

🌟 Selected for report: 0

🚀 Solo Findings: 0

Findings Information

🌟 Selected for report: 0xAsen

Also found by: 0xStalin, Arz, BenRai, Delvir0, Inspecktor, merlin

Labels

bug
2 (Med Risk)
satisfactory
sufficient quality report
duplicate-136

Awards

771.2966 USDC - $771.30

External Links

Lines of code

https://github.com/code-423n4/2023-09-ondo/blob/47d34d6d4a5303af5f46e907ac2292e6a7745f6c/contracts/usdy/rUSDY.sol#L672-L683

Vulnerability details

Impact

The burn() function which is only able to be called by the owner is used to burn rUSDY (shares) from any account. The burn function calls _burnShares() which has the _beforeTokenTransfer() check implemented to ensure none of the actions include a non-whitelisted of restricted user. When calling burn(address _account) it's eventually passed as _beforeTokenTransfer(address _account) where it's checked.

If _account is blacklisted, the function will revert making the admin burn function unusable for that account.

Proof of Concept

All provided above

Tools Used

Manual review

When called via the admin burn function, skip the _beforeTokenTransfer()

Assessed type

Token-Transfer

#0 - c4-pre-sort

2023-09-08T15:51:30Z

raymondfam marked the issue as duplicate of #120

#1 - c4-pre-sort

2023-09-08T15:51:35Z

raymondfam marked the issue as sufficient quality report

#2 - c4-judge

2023-09-19T09:16:15Z

kirk-baird marked the issue as satisfactory

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter