Open c4-bot-10 opened 7 months ago
0xA5DF marked the issue as duplicate of #52
0xA5DF marked the issue as selected for report
specify any _renegotiationOffer.fee,example : set _renegotiationOffer.fee==_renegotiationOffer.principalAmount.
Selecting this report due to this added impact (giving full credit to dupes, since they're high on their own)
0xA5DF marked the issue as satisfactory
Lines of code
https://github.com/code-423n4/2024-04-gondi/blob/b9863d73c08fcdd2337dc80a8b5e0917e18b036c/src/lib/loans/MultiSourceLoan.sol#L358
Vulnerability details
Vulnerability details
addNewTranche()
The code implementation is as follows:Currently only the signature of the
lender
is checked, not the authorization of theborrower
. Then anylender
can addtranche
to anyloan
by_renegotiationOffer.fee
,example : set_renegotiationOffer.fee==_renegotiationOffer.principalAmount
.This doesn't make sense for
borrower
.It is recommended that only the
borrower
performs this method.Impact
lender
can be specified to generate a malicioustranche
to compromiseborrower
.Recommended Mitigation
Assessed type
Context