Closed code423n4 closed 1 year ago
https://github.com/code-423n4/2023-08-goodentry/blob/main/contracts/PositionManager/OptionsPositionManager.sol#L42
An attacker can execute flashloan pretending to be other user.
LendigPool.flashloan sends which user called in the parameter initiator, but it is not used in executeOperation. https://github.com/GoodEntry-io/GoodEntryMarkets/blob/master/contracts/protocol/lendingpool/LendingPool.sol.0x20#L647
LendigPool.flashloan
initiator
executeOperation
Manual review.
Check if initiator == user.
initiator == user
Other
141345 marked the issue as duplicate of #110
gzeon-c4 marked the issue as unsatisfactory: Invalid
Lines of code
https://github.com/code-423n4/2023-08-goodentry/blob/main/contracts/PositionManager/OptionsPositionManager.sol#L42
Vulnerability details
Impact
An attacker can execute flashloan pretending to be other user.
Proof of Concept
LendigPool.flashloan
sends which user called in the parameterinitiator
, but it is not used inexecuteOperation
. https://github.com/GoodEntry-io/GoodEntryMarkets/blob/master/contracts/protocol/lendingpool/LendingPool.sol.0x20#L647Tools Used
Manual review.
Recommended Mitigation Steps
Check if
initiator == user
.Assessed type
Other