Inverse Finance contest - jwood's results

Rethink the way you borrow.

General Information

Platform: Code4rena

Start Date: 25/10/2022

Pot Size: $50,000 USDC

Total HM: 18

Participants: 127

Period: 5 days

Judge: 0xean

Total Solo HM: 9

Id: 175

League: ETH

Inverse Finance

Findings Distribution

Researcher Performance

Rank: 86/127

Findings: 1

Award: $33.63

🌟 Selected for report: 0

🚀 Solo Findings: 0

Findings Information

Awards

33.634 USDC - $33.63

Labels

bug
2 (Med Risk)
satisfactory
duplicate-301

External Links

Lines of code

https://github.com/code-423n4/2022-10-inverse/blob/3e81f0f5908ea99b36e6ab72f13488bbfe622183/src/Market.sol#L136 https://github.com/code-423n4/2022-10-inverse/blob/3e81f0f5908ea99b36e6ab72f13488bbfe622183/src/Market.sol#L203-L206

Vulnerability details

Impact

Admin privilege issue

Gov can drain the DOLA tokens in Market.sol by setting the lender address to an arbitrary address using the setter function then calling recall()

Proof of Concept

set the lender address

function setLender(address _lender) public onlyGov { lender = _lender; }

drain DOLA tokens using recall()

function recall(uint amount) public { require(msg.sender == lender, "Only lender can recall"); dola.transfer(msg.sender, amount); }

#0 - c4-judge

2022-11-05T21:06:14Z

0xean marked the issue as duplicate

#1 - Simon-Busch

2022-12-05T15:35:45Z

Issue marked as satisfactory as requested by 0xean

#2 - c4-judge

2022-12-07T08:22:05Z

Simon-Busch marked the issue as duplicate of #301

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter