-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
33, 35, 116 - tree linking fixes #113
Conversation
Fixes for 33, 35 both look great. For 116, couldn't the same attack described be done without the For example, I could create the new root, approve that as the new link, transfer it over to that, and then unlink? I don't think I can't really see a fix for that. Honestly, I'm not sure this is an issue though. It seems to be part of the expected delegation flow with the required trust assumptions for admins. |
@zobront I think there's an important difference between stealing a tree you yourself create and stealing a tree created by somebody else and linked to your hat. Or maybe I'm misunderstanding your message. |
@spengrah I think you're misunderstanding. Let's take the exact scenario in the report: Root0 (admin0) -> H1 (Admin1) -> H2 (Admin2) -> Root3 (Admin3) -> H4 (Admin4)
Why couldn't Admin2 do the same attack without
In order words, I don't think there's anything special about the |
@zobront OK, I understand now what you're saying. And I agree, the same attack is possible with both request/approve and relink, which makes sense since the latter is just a shortcut for scenarios where the same admin has request and approve rights for the same tophat domain. One way to address this would be to add the same protections as we've just added to |
And of course the other approach would to accept and document the risk. |
sherlock-audit/2023-02-hats-judging#33
sherlock-audit/2023-02-hats-judging#35
sherlock-audit/2023-02-hats-judging#116