FairSide contest - rfa's results

Decentralized Cost Sharing Network.

General Information

Platform: Code4rena

Start Date: 09/11/2021

Pot Size: $30,000 ETH

Total HM: 6

Participants: 17

Period: 3 days

Judge: pauliax

Total Solo HM: 3

Id: 50

League: ETH

FairSide

Findings Distribution

Researcher Performance

Rank: 6/17

Findings: 3

Award: $756.21

🌟 Selected for report: 1

🚀 Solo Findings: 0

Findings Information

🌟 Selected for report: leastwood

Also found by: WatchPug, cmichel, hickuphh3, hyh, rfa

Labels

bug
duplicate
3 (High Risk)

Awards

0.1289 ETH - $610.12

External Links

Handle

rfa

Vulnerability details

Impact

This function can be used by the beneficiary to update their vested token, however the function is callable by anyone, there is no check if the msg.sender/caller is the correct beneficiary, the only check is https://github.com/code-423n4/2021-11-fairside/blob/main/contracts/token/FSDVesting.sol#L151, but this check is user controllable, therefore malicious actor can call this function to inflate the amount variable to uint256(-1), this can lead to dos, when the correct beneficiary want to update their vested token through https://github.com/code-423n4/2021-11-fairside/blob/main/contracts/token/FSD.sol._createdVesting()

Proof of Concept

https://github.com/code-423n4/2021-11-fairside/blob/main/contracts/token/FSDVesting.sol#L147

Tools Used

#0 - YunChe404

2021-11-14T11:15:07Z

Change severity to bug risk level 3

#1 - YunChe404

2021-11-14T11:15:36Z

#32

#2 - pauliax

2021-11-17T12:08:09Z

A duplicate of #101

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter