Open howlbot-integration[bot] opened 1 month ago
This is a useful note to be aware of, but I'd categorize it low/informational as role providers are inherently trusted entities. The likelihood and impact of this kind of attack are pretty minimal.
There are a few factors to be considered:
While the first two have me on the fence when choosing between M and L severity, the third point is a tiebreaker towards M. If we stick to the C4 severity categorization, I see a good fit with the Med definition:
the function of the protocol or its availability could be impacted [...] with a hypothetical attack path with stated assumptions
3docSec marked the issue as selected for report
3docSec marked the issue as satisfactory
Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/access/FixedTermLoanHooks.sol#L413
Vulnerability details
Proof of Concept
If we look at the code comments, we'll see that role providers can update a user's credential only if at least one of the 3 is true:
This means that a role providers should not be able to reduce a credential set by another role provider.
However, this could easily be bypassed by simply splitting the call into 2 separate ones:
Recommended Mitigation Steps
Fix is non-trivial.
Assessed type
Context