Closed c4-submissions closed 1 year ago
raymondfam marked the issue as low quality report
raymondfam marked the issue as duplicate of #29
gzeon-c4 marked the issue as unsatisfactory: Invalid
gzeon-c4 marked the issue as not a duplicate
gzeon-c4 marked the issue as primary issue
gzeon-c4 marked the issue as duplicate of #779
gzeon-c4 marked the issue as satisfactory
Lines of code
https://github.com/code-423n4/2023-09-centrifuge/blob/512e7a71ebd9ae76384f837204216f26380c9f91/src/token/RestrictionManager.sol#L28-L42
Vulnerability details
Impact
The
detectTransferRestriction
takes in all the necessary parameters:However it only performs a check on the address
to
The restriction used here is timebased, however a user can continuing using, swapping, transferring and even redeeming their tranche tokens long after their restriction time has passed.Proof of Concept
This is caused by the function below
This function
detectTransferRestriction
checks only the destination, not the origin addressTools Used
Manual review
Recommended Mitigation Steps
Implement checks for the
from
addressAssessed type
ERC20