Unprotected call to a function sending Ether to an arbitrary address. #619
Labels
2 (Med Risk)
Assets not at direct risk, but function/availability of the protocol could be impacted or leak value
bug
Something isn't working
edited-by-warden
primary issue
Highest quality submission among a set of duplicates
unsatisfactory
does not satisfy C4 submission criteria; not eligible for awards
Lines of code
https://github.com/code-423n4/2023-10-nextgen/blob/8b518196629faa37eae39736837b24926fd3c07c/smart-contracts/MinterContract.sol#L461
https://github.com/code-423n4/2023-10-nextgen/blob/8b518196629faa37eae39736837b24926fd3c07c/smart-contracts/MinterContract.sol#L437
Vulnerability details
Impact
If the admin address is controlled by a malicious party, they could drain the entire balance of the contract, which might not be the intended behavior.
Proof of Concept
Tools Used
Manual Review
Recommended Mitigation Steps
Ensure that an arbitrary user cannot withdraw unauthorized fund, by adding additional checks and controls..
Assessed type
Reentrancy
The text was updated successfully, but these errors were encountered: