Submitted by rayn
NFTLoanFacilitator.sol#L205-L208
NFTLoanFacilitator.sol#L215-L218
If an attacker already calls lend() to lend to a loan, the attacker can manipulate loanInfo by reentrancy attack when any lenders try to buyout. The attacker can set bad values of lendInfo (e.g. very long duration, and 0 interest rate) that the lender who wants to buyout dont expect.
An attacker lends a loan, and loanAssetContractAddress in loanInfo is ERC777 which is suffering from reentrancy attack. When a lender (victim) try to buyout the loan of the attacker:
vim
Use nonReentrant modifier on lend() to prevent reentrancy attack: OpenZeppelin/ReentrancyGuard.sol
wilsoncusack (Backed Protocol) acknowledged, but disagreed with High severity and commented:
wilsoncusack (Backed Protocol) confirmed and commented:
wilsoncusack (Backed Protocol) commented:
wilsoncusack (Backed Protocol) resolved and commented:
gzeon (judge) commented:
