Ondo Finance - jaydhales's results

Institutional-Grade Finance, Now Onchain.

General Information

Platform: Code4rena

Start Date: 29/03/2024

Pot Size: $36,500 USDC

Total HM: 5

Participants: 72

Period: 5 days

Judge: 3docSec

Total Solo HM: 1

Id: 357

League: ETH

Ondo Finance

Findings Distribution

Researcher Performance

Rank: 48/72

Findings: 1

Award: $8.28

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

8.2807 USDC - $8.28

Labels

bug
downgraded by judge
grade-b
high quality report
primary issue
QA (Quality Assurance)
sponsor confirmed
edited-by-warden
:robot:_119_group
Q-33

External Links

Lines of code

https://github.com/code-423n4/2024-03-ondo-finance/blob/main/contracts/ousg/ousgInstantManager.sol#L554-L573

Vulnerability details

Impact

In setMintFee and setRedeemFee, The require statements check against the state variables and not the parameters _mintFee and _redeemFee`.

This means that mintFee and redeemFee can be set to be above 200. Once set, The Configurer will not be able to change them again as the require statement will fail.

Change mintFee and redeemFee to _mintFee and _redeemFee in #L557 and #L570 respectively

  function setMintFee(
    uint256 _mintFee
  ) external override onlyRole(CONFIGURER_ROLE) {
    require(_mintFee < 200, "OUSGInstantManager::setMintFee: Fee too high");
    emit MintFeeSet(mintFee, _mintFee);
    mintFee = _mintFee;
  }

  function setRedeemFee(
    uint256 _redeemFee
  ) external override onlyRole(CONFIGURER_ROLE) {
    require(_redeemFee < 200, "OUSGInstantManager::setRedeemFee: Fee too high");
    emit RedeemFeeSet(redeemFee, _redeemFee);
    redeemFee = _redeemFee;
  }

Assessed type

DoS

#0 - c4-pre-sort

2024-04-04T04:48:21Z

0xRobocop marked the issue as primary issue

#1 - c4-pre-sort

2024-04-04T04:48:23Z

0xRobocop marked the issue as sufficient quality report

#2 - c4-pre-sort

2024-04-05T18:11:33Z

0xRobocop marked the issue as high quality report

#3 - cameronclifton

2024-04-05T23:02:39Z

Definitely a bug, thanks!

#4 - c4-sponsor

2024-04-05T23:02:43Z

cameronclifton (sponsor) confirmed

#5 - 3docSec

2024-04-09T14:50:52Z

Nice finding. It however has an impact only in case of admin error, so we'll have to leave this as QA.

#6 - c4-judge

2024-04-09T14:51:57Z

3docSec changed the severity to QA (Quality Assurance)

#7 - c4-judge

2024-04-09T14:52:06Z

3docSec marked the issue as grade-b

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter