Skip to content
This repository has been archived by the owner on Jun 2, 2024. It is now read-only.

Oxd1z - calls-loop #2

Closed
sherlock-admin2 opened this issue Nov 29, 2023 · 1 comment
Closed

Oxd1z - calls-loop #2

sherlock-admin2 opened this issue Nov 29, 2023 · 1 comment
Labels
Excluded Excluded by the judge without consulting the protocol or the senior Non-Reward This issue will not receive a payout

Comments

@sherlock-admin2
Copy link
Contributor

sherlock-admin2 commented Nov 29, 2023

Oxd1z

medium

calls-loop

Summary

Calls inside the loop might lead to a denial-of-service attack.

Vulnerability Detail

LockingPositionDelegate.manageOwnedAndDelegated(LockingPositionDelegate.OwnedAndDelegated) has external calls inside a loop: require(bool,string)(msg.sender == cvgControlTower.lockingPositionManager().ownerOf(_ownedAndDelegatedTokens.owneds[i]),TOKEN_NOT_OWNED)

Impact

Code Snippet

https://github.com/sherlock-audit/2023-11-convergence/blob/main/sherlock-cvg/contracts/Locking/LockingPositionDelegate.sol#L337-L340

Tool used

Slither
Manual Review

Recommendation

Favor a pull over push strategy for external calls.

@github-actions github-actions bot closed this as completed Dec 2, 2023
@github-actions github-actions bot added the Excluded Excluded by the judge without consulting the protocol or the senior label Dec 2, 2023
@nevillehuang
Copy link
Collaborator

Invalid, check required for access control for different tokenIds

@sherlock-admin2 sherlock-admin2 changed the title Fast Navy Rooster - calls-loop Oxd1z - calls-loop Dec 24, 2023
@sherlock-admin2 sherlock-admin2 added the Non-Reward This issue will not receive a payout label Dec 24, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Excluded Excluded by the judge without consulting the protocol or the senior Non-Reward This issue will not receive a payout
Projects
None yet
Development

No branches or pull requests

2 participants