code-423n4 / 2024-02-renft-mitigation-findings

0 stars 0 forks source link

H-01 MitigationConfirmed #2

Open c4-bot-6 opened 4 months ago

c4-bot-6 commented 4 months ago

Lines of code

Vulnerability details

C4 Issue

H-01: All orders can be hijacked to lock rental assets forever by tipping a malicious ERC20

Comments

The Seaport protocol supports “tipping”, so users were able to tip a malicious ERC20 when fulfilling an order by adding them to the considerations array. They could use that to prevent stopping rentals, as they could revert the transaction when the asset was supposed to be "transferred back" (considering they control the fake ERC20).

Mitigation

PR-7: A whitelist was introduced for all tokens (ERC20, ERC721, ERC1155).

Notes

Conclusions

Successful Mitigation

c4-judge commented 4 months ago

gzeon-c4 marked the issue as satisfactory

c4-judge commented 4 months ago

gzeon-c4 marked the issue as confirmed for report