Lucene search

K
code423n4Code4renaCODE423N4:2022-01-SHERLOCK-FINDINGS-ISSUES-283
HistoryFeb 11, 2022 - 12:00 a.m.

Reentrancy

2022-02-1100:00:00
Code4rena
github.com
6
vulnerability
impact
proof of concept
mitigation
reentrancy guard
effects-after-interaction

Lines of code
<https://github.com/code-423n4/2022-02-concur/blob/72b5216bfeaa7c52983060ebfc56e72e0aa8e3b0/contracts/ConcurRewardPool.sol#L38&gt;

Vulnerability details

Impact

Potential Reentrancy

Proof of Concept

Reentrancy in ConcurRewardPool.claimRewards(address[]) (contracts/ConcurRewardPool.sol#34-40):
External calls:
- IERC20(_tokens[i]).safeTransfer(msg.sender,getting) (contracts/ConcurRewardPool.sol#37)
State variables written after the call(s):
- reward[msg.sender][_tokens[i]] = 0 (contracts/ConcurRewardPool.sol#38)

Recommended Mitigation Steps

use reentrancy guard or effects-after-interaction


The text was updated successfully, but these errors were encountered:

All reactions