Closed c4-bot-3 closed 6 months ago
0xRobocop marked the issue as insufficient quality report
Missing proof or even minimal hints of why this can't be the intended behavior - as it really seems to be.
3docSec marked the issue as unsatisfactory: Insufficient proof
Lines of code
https://github.com/code-423n4/2024-03-ondo-finance/blob/78779c30bebfd46e6f416b03066c55d587e8b30b/contracts/ousg/rOUSG.sol#L554
Vulnerability details
Impact
Users
cannot redeem theirOUSG
which leads to denial of service.Proof of Concept
When users call the function
redeem
to redeem theirOUSG
the function checks if redeem is paused using thewhenRedeemNotPaused
. the function then calls theunwrap
which which also haswhenNotPaused
modifier which also calls theburnShares
function which checks if contractis paused using thewhenNotPaused
modifier. The issue here is that if therOUSG
contract is paused, users cannot redeem their funds any longer.Tools Used
Manual Review
Recommended Mitigation Steps
Users funds shouldn't be stuck in the contract so I suggest an alternative means of redeeming tokens if the
rOUSG
is paused.Assessed type
DoS