The setExtraArgs
function in the SDLPoolCCIPControllerSecondary.sol
contract lacks a proper access control check, potentially allowing any address to modify the extraArgs
. To address this vulnerability, it is recommended to implement access controls in the setExtraArgs
function, ensuring that only the contract owner can update this critical parameter. I provided code snippet demonstrating the suggested mitigation step by introducing an onlyOwner
modifier to restrict access to authorized addresses.
SDLPoolCCIPControllerSecondary.sol
contract that highlights the lack of access control in the setExtraArgs
function:
In the contract, the onlyOwner
modifier is applied to the setExtraArgs
function. However, it's important to note that the onlyOwner
modifier is not defined in the provided snippet, and its absence implies that the access control check is missing. Addressing this vulnerability, you should add the onlyOwner
modifier to the SDLPoolCCIPControllerSecondary.sol
contract. As suggested:
The setExtraArgs
function currently lacks a proper check to ensure that only the contract owner can modify the extraArgs
. Without proper access control, any address can potentially update this critical parameter, leading to unauthorized modifications and potential security breach.
Manual
Implement an access control modifier in the setExtraArgs
function to ensure that only the contract owner has the authority to update the extraArgs
. This can be achieved by adding a modifier like onlyOwner
to the function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.