50822 sc high deployer can cpgrade arctoken to malicious implementation and steal all user funds
Description
Brief/Intro
Vulnerability Details
function createToken(
string memory name,
string memory symbol,
uint256 initialSupply,
address yieldToken,
string memory tokenUri,
address initialTokenHolder,
uint8 decimals
) external returns (address) {
...
// Grant the DEFAULT_ADMIN_ROLE to the deployer
token.grantRole(token.DEFAULT_ADMIN_ROLE(), msg.sender);
token.grantRole(token.ADMIN_ROLE(), msg.sender);
token.grantRole(token.MANAGER_ROLE(), msg.sender);
token.grantRole(token.YIELD_MANAGER_ROLE(), msg.sender);
token.grantRole(token.YIELD_DISTRIBUTOR_ROLE(), msg.sender);
token.grantRole(token.MINTER_ROLE(), msg.sender);
token.grantRole(token.BURNER_ROLE(), msg.sender);
token.grantRole(token.UPGRADER_ROLE(), address(this));
...
}Impact
Proof of Concept
Context
Previous52026 sc medium claimall could revert because of unbounded gas consumptionsNext50167 sc high retroactive reward drain via incomplete reward debt reset
Was this helpful?