Skip to content

Arbitrary file reads in HashiCorp Nomad

High severity GitHub Reviewed Published Feb 18, 2022 to the GitHub Advisory Database • Updated Apr 21, 2023

Package

gomod github.com/hashicorp/nomad (Go)

Affected versions

>= 0.9.2, < 1.0.18
>= 1.1.0, < 1.1.12
>= 1.2.0, < 1.2.6

Patched versions

1.0.18
1.1.12
1.2.6

Description

Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root. There are currently no known workarounds. Users are recommended to upgrade as soon as possible to avoid this issue.

References

Published by the National Vulnerability Database Feb 17, 2022
Published to the GitHub Advisory Database Feb 18, 2022
Reviewed Mar 1, 2022
Last updated Apr 21, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2022-24683

GHSA ID

GHSA-wmrx-57hm-mw7r

Source code

github.com/hashicorp/nomad

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.