Malicious proxyAdmin can upgrade xerc20 token implementation and steal fund from user. #770
Labels
2 (Med Risk)
Assets not at direct risk, but function/availability of the protocol could be impacted or leak value
bug
Something isn't working
insufficient quality report
This report is not of sufficient quality
🤖_primary
AI based primary recommendation
🤖_174_group
AI based duplicate group recommendation
Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Bridge/xERC20/contracts/XERC20Factory.sol#L135
Vulnerability details
Impact
Malicious proxyAdmin can upgrade xerc20 token implementation and steal fund from user.
Proof of Concept
When deploying deployXERC20, we are calling
note,
and this is how the xerc20 token is deployed
the lock box contract enforce that when withdraw, the token must be burnt,
but Malicious proxyAdmin can upgrade lock box implementation and steal fund directly (one of the way is minting a lot of tokens).
consider any user can deploy xerc20 token and lock box contract, the proxy admin can be anyone and may not be trusted.
Tools Used
Manual Review
Recommended Mitigation Steps
N/A
Assessed type
Token-Transfer
The text was updated successfully, but these errors were encountered: