Vulnerability Description
Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by applying https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5 to any Hydra package. Users are advised to upgrade. Users unable to upgrade should deny the `/api/push` route in a reverse proxy. This also breaks the "Evaluate jobset" button in the frontend.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nixos | Hydra | < 2024-08-27 |
Related Weaknesses (CWE)
References
- https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5Patch
- https://github.com/NixOS/hydra/security/advisories/GHSA-xv29-v93r-2f5vPatchVendor Advisory
- https://github.com/NixOS/nixpkgs/pull/337766Issue TrackingPatch
- https://mastodon.delroth.net/@delroth/113029832631860419Third Party Advisory
FAQ
What is CVE-2024-45049?
CVE-2024-45049 is a vulnerability with a CVSS score of 7.5 (HIGH). Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the a...
How severe is CVE-2024-45049?
CVE-2024-45049 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45049?
Check the references section above for vendor advisories and patch information. Affected products include: Nixos Hydra.