Closed code423n4 closed 2 years ago
Fitraldys
in https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/CollateralizedDebt.sol#L76 there is no reentrant check, because when using _safeMint(), the function will make a call to the to address, through https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/base/ERC721.sol#L97 / _checkOnERC721Received, that will call to the user to address, and the to address is controllable by the to address.
to
https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/CollateralizedDebt.sol#L76
Similar issue reported over here #43 ; hence closing this
bumping sev to match dupe
Handle
Fitraldys
Vulnerability details
Impact
in https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/CollateralizedDebt.sol#L76 there is no reentrant check, because when using _safeMint(), the function will make a call to the
to
address, through https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/base/ERC721.sol#L97 / _checkOnERC721Received, that will call to the userto
address, and theto
address is controllable by theto
address.Proof of Concept
https://github.com/code-423n4/2022-01-timeswap/blob/main/Timeswap/Timeswap-V1-Convenience/contracts/CollateralizedDebt.sol#L76