Open code423n4 opened 3 years ago
This can be an issue as our strat takes those variables at face value
As Badger we ended up upgrading the strategy to check for the validity of the inputs
for convex side, we can layer on an admin contract that has the correct checks
Handle
cmichel
Vulnerability details
Vulnerability Details
The
CvxLocker.setBoost
function does not validate the_max, _rate
parameters, instead it validates the already set storage variables.Impact
Once wrong boost values are set (which are not validated when they are set), they cannot be set to new values anymore, breaking core contract functionality.
Recommended Mitigation Steps
Implement these two checks instead: