Lucene search

K
cve[email protected]CVE-2023-42449
HistoryOct 04, 2023 - 8:15 p.m.

CVE-2023-42449

2023-10-0420:15:10
CWE-20
web.nvd.nist.gov
12
cve-2023-42449
hydra
cardano
scalability solution
vulnerability
malicious initializer
pts extraction
committed funds
spoofing
txos
nvd

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%

Hydra is the two-layer scalability solution for Cardano. Prior to version 0.13.0, it is possible for a malicious head initializer to extract one or more PTs for the head they are initializing due to incorrect data validation logic in the head token minting policy which then results in an flawed check for burning the head ST in the initial validator. This is possible because it is not checked in HeadTokens.hs that the datums of the outputs at the initial validator are equal to the real head ID, and it is also not checked in the off-chain code.

During the Initial state of the protocol, if the malicious initializer removes a PT from the Hydra scripts it becomes impossible for any other participant to reclaim any funds they have attempted to commit into the head, as to do so the Abort transaction must burn all the PTs for the head, but they cannot burn the PT which the attacker controls and so cannot satisfy this requirement. That means the initializer can lock the other participants committed funds forever or until they choose to return the PT (ransom).

The malicious initializer can also use the PT to spoof that they have committed a particular TxO when progressing the head into the Open state. For example, they could say they committed a TxO residing at their address containing 100 ADA, but in fact this 100 ADA was not moved into the head, and thus in order for an other participant to perform the fanout they will be forced to pay the attacker the 100 ADA out of their own funds, as the fanout transaction must pay all the committed TxOs (even though the attacker did not really commit that TxO). They can do this by placing the PT in a UTxO with a well-formed Commit datum with whatever contents they like, then use this UTxO in the collectCom transaction. There may be other possible ways to abuse having control of a PT.

Version 0.13.0 fixes this issue.

Affected configurations

Vulners
NVD
Node
input-output-hkhydraRange<0.13.0
CPENameOperatorVersion
iohk:hydraiohk hydralt0.13.0

CNA Affected

[
  {
    "vendor": "input-output-hk",
    "product": "hydra",
    "versions": [
      {
        "version": "< 0.13.0",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%

Related for CVE-2023-42449