TokenManager::withdraw
is designed to allow users to withdraw available funds from the protocol. However, there is a missing statement and that disallows to retrieve available funds if a user want to withdraw ERC20 tokens from the protocol.
When dealing with ERC20 tokens, the issue arises because TokenManager::withdraw
is missing the CapitalPool::approve
call before invoking the _safe_transfer_from
function. Consequently, the transaction always reverts with the following error: ERC20InsufficientAllowance
.
The vulnerability prevents users from withdrawing ERC20 tokens from the protocol. This means that all the ERC20 tokens sent to the contract would be stuck.
User calls PreMarket::createOffer
function.
User1 calls PreMarket:createTaker
function.
User calls withdraw()
function, and it reverts with TransferFailed
error.
Place this into the PreMarkets.t.sol
file and execute the following command:
forge test --mt test_withdrawRevertsWithoutApprove -vvvv
Manual testing
Foundry
There are a few recommended mitigations here.
Instead of calling the _safe_tranfer_from
function, use the _transfer
function.
(TokenManager::_transfer
contains another vulnerability described in the submission "Funds are stuck in the protocol because of approve(address(this))
")
Alternatively, call CapitalPool::approve
function before calling _safe_tranfer_from
function in TokenManager::withdraw
.
This issue's severity has similar reasonings to #252, whereby If we consider the correct permissioned implementation for the `approve()` function within `CapitalPool.sol`, this would be a critical severity issue, because the withdrawal of funds will be permanently blocked and must be rescued by the admin via the `Rescuable.sol` contract, given it will always revert [here](https://github.com/Cyfrin/2024-08-tadle/blob/04fd8634701697184a3f3a5558b41c109866e5f8/src/core/CapitalPool.sol#L36-L38) when attempting to call a non-existent function selector `approve` within the TokenManager contract. Similarly, the argument here is the approval function `approve` was made permisionless, so if somebody beforehand calls approval for the TokenManager for the required token, the transfer will infact not revert when a withdrawal is invoked. I will leave open for escalation discussions, but based on my first point, I believe high severity is appropriate. It also has a slightly different root cause and fix whereby an explicit approval needs to be provided before a call to `_safe_transfer_from()`, if not, the alternative `_transfer()` function should be used to provide an approval, assuming a fix was implemented for issue #252
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.