Skip to content
This repository has been archived by the owner on Oct 27, 2024. It is now read-only.

fibonacci - Owner and admin roles in TitlesGraph are not initialized #146

Closed
sherlock-admin3 opened this issue Apr 26, 2024 · 5 comments
Closed
Labels
Duplicate A valid issue that is a duplicate of an issue with `Has Duplicates` label Escalation Resolved This issue's escalations have been approved/rejected Medium A valid Medium severity issue Reward A payout will be made for this issue

Comments

@sherlock-admin3
Copy link
Contributor

sherlock-admin3 commented Apr 26, 2024

fibonacci

high

Owner and admin roles in TitlesGraph are not initialized

Summary

The TitlesGraph contract is intended to be upgradable. However, the owner and admin roles are assigned within the constructor. This implies that they will be initialized in the implementation storage, leaving the proxy storage unaffected.

Vulnerability Detail

constructor(address owner_, address admin_) {
    _initializeOwner(owner_);
    _grantRoles(admin_, ADMIN_ROLE);
}

Impact

Neither the owner nor the admin of the TitlesGraph contract has the ability to manage it.

Code Snippet

https://github.com/sherlock-audit/2024-04-titles/blob/main/wallflower-contract-v2/src/graph/TitlesGraph.sol#L52-L55

Tool used

Manual Review

Recommendation

Assign owner and admin roles within an initialization function.

Duplicate of #148

@github-actions github-actions bot closed this as completed May 6, 2024
@github-actions github-actions bot added Medium A valid Medium severity issue Duplicate A valid issue that is a duplicate of an issue with `Has Duplicates` label labels May 6, 2024
@sherlock-admin2 sherlock-admin2 changed the title Loud Candy Coyote - Owner and admin roles in TitlesGraph are not initialized fibonacci - Owner and admin roles in TitlesGraph are not initialized May 12, 2024
@sherlock-admin2 sherlock-admin2 added the Reward A payout will be made for this issue label May 12, 2024
@0xf1b0
Copy link

0xf1b0 commented May 13, 2024

Escalate

This is not a duplicate of #272.

This issue leaves the TitlesGraph contract without an owner, and it appears to me that it should be considered high severity.

@sherlock-admin3
Copy link
Contributor Author

Escalate

This is not a duplicate of #272.

This issue leaves the TitlesGraph contract without an owner, and it appears to me that it should be considered high severity.

You've created a valid escalation!

To remove the escalation from consideration: Delete your comment.

You may delete or edit your escalation comment anytime before the 48-hour escalation window closes. After that, the escalation becomes final.

@WangSecurity
Copy link
Collaborator

Indeed, the watsons are correct here, planning to accept the escalation and create a new family of medium severity with the core issue of "roles are set incorrectly or not set at all" and duplicate with #148 (also in #148 you can see a more comprehensive list of duplicates).

@Evert0x
Copy link

Evert0x commented May 22, 2024

Result:
Medium
Duplicate of #148

@sherlock-admin2 sherlock-admin2 removed the Escalated This issue contains a pending escalation label May 22, 2024
@sherlock-admin3 sherlock-admin3 added the Escalation Resolved This issue's escalations have been approved/rejected label May 22, 2024
@sherlock-admin4
Copy link
Contributor

Escalations have been resolved successfully!

Escalation status:

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Duplicate A valid issue that is a duplicate of an issue with `Has Duplicates` label Escalation Resolved This issue's escalations have been approved/rejected Medium A valid Medium severity issue Reward A payout will be made for this issue
Projects
None yet
Development

No branches or pull requests

6 participants