Closed c4-bot-2 closed 10 months ago
141345 marked the issue as sufficient quality report
settleTo
set to LENDER
malicious PAY order
141345 marked the issue as primary issue
Alec1017 (sponsor) disputed
This PoC doesnt generate a valid order through the protocol, it uses partial testing functions that bypass the checks that occur in the protocol which would prevent this scenario
Agree with sponsor the POC seems invalid and doesn't follow the expected user flow for generating a order.
0xean marked the issue as unsatisfactory: Invalid
Lines of code
https://github.com/re-nft/smart-contracts/blob/3ddd32455a849c3c6dc3c3aad7a33a6c9b44c291/src/policies/Create.sol#L247-L314
Vulnerability details
Impact
Malicious lender can craft a
PAY
order to ensure the funds are not settle to the renter when the rent is stopped.VULNERABILITY DETAILS
I found this almost at the end of the audit and as such did no have enough time to write a more detailed report, however the POC provided below proves my finding
settleTo
set toLENDER
andorderType
set toPAY
CODED POC
TOOLS USED
Foundry
RECOMMENDATION
Implement a logic to ensure that the payment can only be settled to the
renter
for aPAY
order.Assessed type
Invalid Validation