The TokenManager::_transfer
function is used to transfer tokens. However, it calls the CapitalPool:approve
function with an incorrect input parameter, which prevents the retrieval of available funds.
The CapitalPool:approve
function expects the token address as an input parameter:
However, the TokenManager::_transfer
function incorrectly passes the token manager address (address(this)
) as an input parameter.
The vulnerability prevents users from withdrawing available funds from the protocol. As the result, all the assets sent to the contract would be stuck.
User calls PreMarket::createOffer
function, sending 0.012 ether to the protocol.
User1 calls PreMarket:createTaker
function, sending 0.005175 ether to the protocol.
User calls withdraw()
function, and it reverts with ApproveFailed
error.
Place this into the PreMarkets.t.sol
file and execute the following command:
forge test --mt test_withdrawRevertsBecauseApproveAddressThis -vv
Manual testing
Foundry
It is recommended to change the input parameter:
If we consider the correct permissioned implementation for the `approve()` function within `CapitalPool.sol`, this would be a critical severity issue, because the withdrawal of funds will be permanently blocked and must be rescued by the admin via the `Rescuable.sol` contract, given it will always revert [here](https://github.com/Cyfrin/2024-08-tadle/blob/04fd8634701697184a3f3a5558b41c109866e5f8/src/core/CapitalPool.sol#L36-L38) when attempting to call a non-existent function selector `approve` within the TokenManager contract. The argument up in the air is since the approval function `approve` was made permisionless, the `if` block within the internal `_transfer()` function will never be invoked if somebody beforehand calls approval for the TokenManager for the required token, so the transfer will infact not revert when a withdrawal is invoked. I will leave open for escalation discussions, but based on my first point, I believe high severity is appropriate.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.