Closed howlbot-integration[bot] closed 1 month ago
3docSec changed the severity to QA (Quality Assurance)
This issue is slightly different than #26 in the sense that it presents a different attack scenario.
I still consider this an L however, because this unique attack scenario speculates on particular implementations of validateCredential
which are out of scope.
3docSec marked the issue as grade-b
As you said @3docSec this relies on a very specific implementation of validateCredential
which only gives instantaneous access. It further assumes the attacker has access to the signature for the specific lender (as there'd never be a situation where the validation data is just a nonce).
This previously downgraded issue has been upgraded by 3docSec
I find this group compatible with the Med severity for the following reasons:
validateCredential
isn't really a speculation but rather a very reasonable implementation, one that was also assumed in the previous audit (finding number 2)3docSec marked the issue as satisfactory
Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/access/AccessControlHooks.sol#L812
Vulnerability details
Impact
AccessControlHooks.onQueueWithdrawal
has no restrictions on calling and can be called by anyone.validateCredential
, such as ECDSA signature, prohibited from being replayed.Proof of Concept
Tools Used
Foundry
Recommended Mitigation Steps
AccessControlHooks.onQueueWithdrawal
should checkmsg.sender
is market bymarket.isHooked
.Assessed type
DoS