Closed c4-bot-2 closed 8 months ago
Picodes marked the issue as primary issue
othernet-global (sponsor) confirmed
There is now no limit to the number of tokens that can be proposed for whitelisting.
Also, any whitelisting proposal that has reached quorum with sufficient approval votes can be executed.
https://github.com/othernet-global/salty-io/commit/ccf4368fcf1777894417fccd2771456f3eeaa81c
Picodes marked the issue as satisfactory
Picodes marked issue #116 as primary and marked this issue as a duplicate of 116
Picodes marked the issue as duplicate of #991
Lines of code
https://github.com/code-423n4/2024-01-salty/blob/53516c2cdfdfacb662cdea6417c52f23c94d5b5b/src/dao/Proposals.sol#L167
Vulnerability details
Impact
The attacker made proposeTokenWhitelisting impossible to create.
Proof of Concept
ProposeTokenWhitelisting
will check_openBallotsForTokenWhitelisting.length()
whether more thandaoConfig.maxPendingTokensForWhitelisting
. But the question is anyone can call this function, the attacker can create invalid propose, let_openBallotsForTokenWhitelisting
. Length more than the maximum value. proposeTokenWhitelisting could no longer be executed.Because the
daoConfig.maxPendingTokensForWhitelisting
defaults to 5, so_openBallotsForTokenWhitelisting
. The length is more than the maximum easily.Tools Used
vscode, manual
Recommended Mitigation Steps
Assessed type
DoS