恶意头初始化程序可以从 Hydra 脚本的控制中提取 PT,从而导致锁定参与者提交或欺骗提交 (CVE-2023-42449)

admin 2023-11-29 20:52:20 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
恶意头初始化程序可以从 Hydra 脚本的控制中提取 PT,从而导致锁定参与者提交或欺骗提交 (CVE-2023-42449)

CVE编号

CVE-2023-42449

利用情况

暂无

补丁情况

N/A

披露时间

2023-10-05
漏洞描述
Hydra is the two-layer scalability solution for Cardano. Prior to version 0.13.0, it is possible for a malicious head initializer to extract one or more PTs for the head they are initializing due to incorrect data validation logic in the head token minting policy which then results in an flawed check for burning the head ST in the `initial` validator. This is possible because it is not checked in `HeadTokens.hs` that the datums of the outputs at the `initial` validator are equal to the real head ID, and it is also not checked in the `off-chain code`. During the `Initial` state of the protocol, if the malicious initializer removes a PT from the Hydra scripts it becomes impossible for any other participant to reclaim any funds they have attempted to commit into the head, as to do so the Abort transaction must burn all the PTs for the head, but they cannot burn the PT which the attacker controls and so cannot satisfy this requirement. That means the initializer can lock the other participants committed funds forever or until they choose to return the PT (ransom). The malicious initializer can also use the PT to spoof that they have committed a particular TxO when progressing the head into the `Open` state. For example, they could say they committed a TxO residing at their address containing 100 ADA, but in fact this 100 ADA was not moved into the head, and thus in order for an other participant to perform the fanout they will be forced to pay the attacker the 100 ADA out of their own funds, as the fanout transaction must pay all the committed TxOs (even though the attacker did not really commit that TxO). They can do this by placing the PT in a UTxO with a well-formed `Commit` datum with whatever contents they like, then use this UTxO in the `collectCom` transaction. There may be other possible ways to abuse having control of a PT. Version 0.13.0 fixes this issue.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/input-output-hk/hydra/blob/1e13b60a7b21c5ccd6c36e3cf220547...
https://github.com/input-output-hk/hydra/blob/1e13b60a7b21c5ccd6c36e3cf220547...
https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md
https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/C...
https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 iohk hydra * Up to (excluding) 0.13.0
CVSS3评分 8.1
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 无
  • 完整性 高
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
NVD-CWE-noinfo
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0