Submitted by Chom, also found by 0xSmartContract, cccz, Jeiwan, linmiaomiao, SinceJuly, and V_B
Hackers can deploy tokens with respective names as the stable ones to impersonate the stable token. Then hackers can get profit from the malicious price oracle.
If hackers or malicious admin deploy a non-stable token but has cNOTE, cUSDT, or cUSDC as symbols, these tokens will act as a stable token while in fact, it isnt.
Use fixed address whitelisting instead for example if (address(ctoken) == cUSDC_address) ... where cUSDC_address is an immutable variable set on the constructor.
tkkwon1998 (Canto) disputed and commented:
0xean (judge) commented:
nivasan1 (Canto) commented:
0xean (judge) decreased severity to Medium and commented:
