All the vulnerabilites related to HashiCorp - Nomad Enterprise
cve-2023-3072
Vulnerability from cvelistv5
Published
2023-07-19 23:34
Modified
2024-10-17 14:10
Severity ?
EPSS score ?
Summary
Nomad ACL Policies without Label are Applied to Unexpected Resources
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:41:04.141Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:10:02.775042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:10:16.427Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.4.10", "status": "affected", "version": "0.7.0", "versionType": "semver" }, { "lessThanOrEqual": "1.5.6", "status": "affected", "version": "0.7.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.4.10", "status": "affected", "version": "0.7.0", "versionType": "semver" }, { "lessThanOrEqual": "1.5.6", "status": "affected", "version": "0.7.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T19:22:23.319Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270" } ], "source": { "advisory": "HCSEC-2023-20", "discovery": "INTERNAL" }, "title": "Nomad ACL Policies without Label are Applied to Unexpected Resources" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-3072", "datePublished": "2023-07-19T23:34:56.155Z", "dateReserved": "2023-06-02T15:50:43.081Z", "dateUpdated": "2024-10-17T14:10:16.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7625
Vulnerability from cvelistv5
Published
2024-08-14 23:20
Modified
2025-01-09 19:19
Severity ?
EPSS score ?
Summary
Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7625", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:21:56.859263Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-09T19:19:01.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "0.6.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.6.14", "status": "unaffected" }, { "at": "1.7.11", "status": "unaffected" } ], "lessThan": "1.8.3", "status": "affected", "version": "0.6.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-130", "descriptions": [ { "lang": "en", "value": "CAPEC-130: Excessive Allocation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "CWE-610: Externally Controlled Reference to a Resource in Another Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:21:32.859Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-17-nomad-vulnerable-to-allocation-directory-escape-on-non-existing-file-paths-through-archive-unpacking/69293" } ], "source": { "advisory": "HCSEC-2024-17", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-7625", "datePublished": "2024-08-14T23:20:17.888Z", "dateReserved": "2024-08-08T19:14:29.366Z", "dateUpdated": "2025-01-09T19:19:01.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0821
Vulnerability from cvelistv5
Published
2023-02-16 21:23
Modified
2025-03-18 14:35
Severity ?
EPSS score ?
Summary
Nomad Client Vulnerable to Decompression Bombs in Artifact Block
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-05-nomad-client-vulnerable-to-decompression-bombs-in-artifact-block/50292" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0821", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-18T14:35:37.407891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-18T14:35:44.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.2.15", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.3.8", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.4.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.2.15", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.3.8", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.4.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4." } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4." } ], "impacts": [ { "capecId": "CAPEC-572", "descriptions": [ { "lang": "en", "value": "CAPEC-572 Artificially Inflate File Sizes" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-409", "description": "CWE-409 Improper Handling of Highly Compressed Data (Data Amplification)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-16T21:23:24.500Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-05-nomad-client-vulnerable-to-decompression-bombs-in-artifact-block/50292" } ], "source": { "discovery": "INTERNAL" }, "title": "Nomad Client Vulnerable to Decompression Bombs in Artifact Block" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-0821", "datePublished": "2023-02-16T21:23:24.500Z", "dateReserved": "2023-02-13T21:43:02.039Z", "dateUpdated": "2025-03-18T14:35:44.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-12678
Vulnerability from cvelistv5
Published
2024-12-20 01:49
Modified
2024-12-20 17:08
Severity ?
EPSS score ?
Summary
Nomad Allocations Vulnerable To Privilege Escalation Within A Namespace Using Unredacted Workload Identity Tokens
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12678", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-20T17:07:58.479503Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-20T17:08:12.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.9.4", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.8.8", "status": "unaffected" }, { "at": "1.7.16", "status": "unaffected" } ], "lessThan": "1.9.4", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Community and Nomad Enterprise (\"Nomad\") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad Community Edition 1.9.4 and Nomad Enterprise 1.9.4, 1.8.8, and 1.7.16.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Community and Nomad Enterprise (\"Nomad\") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad Community Edition 1.9.4 and Nomad Enterprise 1.9.4, 1.8.8, and 1.7.16." } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122: Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-20T01:49:40.583Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-29-nomad-allocations-vulnerable-to-privilege-escalation-within-a-namespace-using-unredacted-workload-identity-token/72119" } ], "source": { "advisory": "HCSEC-2024-29", "discovery": "INTERNAL" }, "title": "Nomad Allocations Vulnerable To Privilege Escalation Within A Namespace Using Unredacted Workload Identity Tokens" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-12678", "datePublished": "2024-12-20T01:49:40.583Z", "dateReserved": "2024-12-16T16:20:12.439Z", "dateUpdated": "2024-12-20T17:08:12.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1782
Vulnerability from cvelistv5
Published
2023-04-05 19:10
Modified
2025-02-10 16:27
Severity ?
EPSS score ?
Summary
Nomad Unauthenticated Client Agent HTTP Request Privilege Escalation
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1782", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-10T16:26:59.214020Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-10T16:27:03.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.5.3", "status": "affected", "version": "1.5.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.5.3", "status": "affected", "version": "1.5.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.\u003c/p\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T23:12:31.598Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375" } ], "source": { "discovery": "INTERNAL" }, "title": "Nomad Unauthenticated Client Agent HTTP Request Privilege Escalation" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-1782", "datePublished": "2023-04-05T19:10:52.697Z", "dateReserved": "2023-03-31T14:50:56.892Z", "dateUpdated": "2025-02-10T16:27:03.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1296
Vulnerability from cvelistv5
Published
2023-03-14 14:45
Modified
2025-02-27 15:28
Severity ?
EPSS score ?
Summary
Nomad ACLs Can Not Deny Access to Workload's Own Variables
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1296", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T15:28:08.533119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T15:28:15.947Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.5.0" }, { "lessThan": "1.4.6", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.5.0" }, { "lessThan": "1.4.6", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.5.0 did not correctly enforce deny policies applied to a workload\u2019s variables. Fixed in 1.4.6 and 1.5.1.\u003c/p\u003e\u003cbr\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.5.0 did not correctly enforce deny policies applied to a workload\u2019s variables. Fixed in 1.4.6 and 1.5.1." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-682", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-14T14:45:24.074Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390" } ], "source": { "discovery": "EXTERNAL" }, "title": "Nomad ACLs Can Not Deny Access to Workload\u0027s Own Variables" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-1296", "datePublished": "2023-03-14T14:45:24.074Z", "dateReserved": "2023-03-09T18:50:52.818Z", "dateUpdated": "2025-02-27T15:28:15.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1329
Vulnerability from cvelistv5
Published
2024-02-08 19:20
Modified
2024-09-26 17:05
Severity ?
EPSS score ?
Summary
Nomad Vulnerable to Arbitrary Write Through Symlink Attack
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1329", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-17T19:54:48.732815Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T19:54:54.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:25.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.5.13", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.6.6", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.7.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.5.13", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.6.6", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "1.7.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14." } ], "impacts": [ { "capecId": "CAPEC-132", "descriptions": [ { "lang": "en", "value": "CAPEC-132: Symlink Attack" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (Link Following)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T17:05:43.601Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack" } ], "source": { "advisory": "HCSEC-2024-03", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable to Arbitrary Write Through Symlink Attack" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-1329", "datePublished": "2024-02-08T19:20:10.831Z", "dateReserved": "2024-02-07T19:00:15.653Z", "dateUpdated": "2024-09-26T17:05:43.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3744
Vulnerability from cvelistv5
Published
2025-05-13 18:40
Modified
2025-05-13 19:21
Severity ?
EPSS score ?
Summary
Nomad Vulnerable To Violation Of Mandatory Sentinel Policies in Nomad Job Submissions via Policy Override
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3744", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-13T19:20:47.693891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-13T19:21:33.581Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.9.9", "status": "unaffected" }, { "at": "1.8.13", "status": "unaffected" } ], "lessThan": "1.10.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Enterprise (\u201cNomad\u201d) jobs using the policy override option are bypassing the mandatory sentinel policies. This vulnerability, identified as CVE-2025-3744, is fixed in Nomad Enterprise 1.10.1, 1.9.9, and 1.8.13.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Enterprise (\u201cNomad\u201d) jobs using the policy override option are bypassing the mandatory sentinel policies. This vulnerability, identified as CVE-2025-3744, is fixed in Nomad Enterprise 1.10.1, 1.9.9, and 1.8.13." } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122: Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-13T18:40:08.281Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2025-08-nomad-enterprise-vulnerable-to-violation-of-mandatory-sentinel-policies-in-job-submissions-via-policy-override/74935" } ], "source": { "advisory": "HCSEC-2025-06", "discovery": "EXTERNAL" }, "title": "Nomad Vulnerable To Violation Of Mandatory Sentinel Policies in Nomad Job Submissions via Policy Override" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2025-3744", "datePublished": "2025-05-13T18:40:08.281Z", "dateReserved": "2025-04-16T18:38:47.695Z", "dateUpdated": "2025-05-13T19:21:33.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6717
Vulnerability from cvelistv5
Published
2024-07-23 00:16
Modified
2024-08-01 21:41
Severity ?
EPSS score ?
Summary
Nomad Vulnerable to Allocation Directory Path Escape Through Archive Unpacking
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T14:13:28.071492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:39:26.702Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:41:04.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2024-15-nomad-vulnerable-to-allocation-directory-path-escape-through-archive-unpacking/68781" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.8.2", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.6.13", "status": "unaffected" }, { "at": "1.7.10", "status": "unaffected" } ], "lessThan": "1.8.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1 archive unpacking during migration is vulnerable to path escaping of the allocation directory. This vulnerability, CVE-2024-6717, is fixed in Nomad 1.6.13, 1.7.10, and 1.8.2.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1 archive unpacking during migration is vulnerable to path escaping of the allocation directory. This vulnerability, CVE-2024-6717, is fixed in Nomad 1.6.13, 1.7.10, and 1.8.2." } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126: Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "CWE-610: Externally Controlled Reference to a Resource in Another Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T00:16:20.955Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-15-nomad-vulnerable-to-allocation-directory-path-escape-through-archive-unpacking/68781" } ], "source": { "advisory": "HCSEC-2024-15", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable to Allocation Directory Path Escape Through Archive Unpacking" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-6717", "datePublished": "2024-07-23T00:16:20.955Z", "dateReserved": "2024-07-12T19:14:11.820Z", "dateUpdated": "2024-08-01T21:41:04.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3299
Vulnerability from cvelistv5
Published
2023-07-19 23:35
Modified
2024-10-17 14:10
Severity ?
EPSS score ?
Summary
Nomad Caller ACL Token's Secret ID is Exposed to Sentinel
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:08.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3299", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:09:56.762733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:10:40.030Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.4.10", "status": "affected", "version": "1.2.11", "versionType": "semver" }, { "lessThanOrEqual": "1.5.6", "status": "affected", "version": "1.2.11", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11." } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122: Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201: Insertion of Sensitive Information Into Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T20:53:39.914Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271" } ], "source": { "advisory": "HCSEC-2023-21", "discovery": "INTERNAL" }, "title": "Nomad Caller ACL Token\u0027s Secret ID is Exposed to Sentinel" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-3299", "datePublished": "2023-07-19T23:35:12.990Z", "dateReserved": "2023-06-16T18:47:08.212Z", "dateUpdated": "2024-10-17T14:10:40.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1299
Vulnerability from cvelistv5
Published
2023-03-14 14:46
Modified
2025-02-27 15:27
Severity ?
EPSS score ?
Summary
Nomad Job Submitter Privilege Escalation Using Workload Identity
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1299", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T15:27:24.168391Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T15:27:31.165Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.5.0" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.5.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 1.5.0 allow a job submitter to escalate to management-level privileges using workload identity and task API. Fixed in 1.5.1.\u003c/p\u003e\u003cbr\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.5.0 allow a job submitter to escalate to management-level privileges using workload identity and task API. Fixed in 1.5.1." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-14T14:46:41.456Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389" } ], "source": { "discovery": "INTERNAL" }, "title": "Nomad Job Submitter Privilege Escalation Using Workload Identity" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-1299", "datePublished": "2023-03-14T14:46:41.456Z", "dateReserved": "2023-03-09T20:18:12.180Z", "dateUpdated": "2025-02-27T15:27:31.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3866
Vulnerability from cvelistv5
Published
2022-11-10 05:34
Modified
2025-05-01 19:05
Severity ?
EPSS score ?
Summary
Nomad Workload Identity Token Can List Non-sensitive Metadata for Paths Under nomad/
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:58.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2022-25-nomad-s-workload-identity-token-can-list-non-sensitive-metadata-for-nomad-paths/46167" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3866", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T19:04:44.420595Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T19:05:00.374Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.4.1" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.4.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2." } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668 Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-10T05:42:07.716Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2022-25-nomad-s-workload-identity-token-can-list-non-sensitive-metadata-for-nomad-paths/46167" } ], "source": { "discovery": "INTERNAL" }, "title": "Nomad Workload Identity Token Can List Non-sensitive Metadata for Paths Under nomad/" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2022-3866", "datePublished": "2022-11-10T05:34:52.468Z", "dateReserved": "2022-11-04T22:54:15.589Z", "dateUpdated": "2025-05-01T19:05:00.374Z", "requesterUserId": "5311d85b-fc2e-473d-9ddd-71031e52448b", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-4922
Vulnerability from cvelistv5
Published
2025-06-11 13:24
Modified
2025-06-11 13:53
Severity ?
EPSS score ?
Summary
Nomad Vulnerable To Incorrect ACL Policy Lookup Attached To A Job
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4922", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-11T13:52:06.362667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-11T13:53:55.809Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.10.2", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.9.10", "status": "unaffected" }, { "at": "1.8.14", "status": "unaffected" } ], "lessThan": "1.10.2", "status": "affected", "version": "1.4.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Community and Nomad Enterprise (\u201cNomad\u201d) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Community and Nomad Enterprise (\u201cNomad\u201d) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233: Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-11T13:24:18.976Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2025-12-nomad-vulnerable-to-incorrect-acl-policy-lookup-attached-to-a-job/75396" } ], "source": { "advisory": "HCSEC-2025-12", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable To Incorrect ACL Policy Lookup Attached To A Job" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2025-4922", "datePublished": "2025-06-11T13:24:18.976Z", "dateReserved": "2025-05-18T01:47:06.331Z", "dateUpdated": "2025-06-11T13:53:55.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-0937
Vulnerability from cvelistv5
Published
2025-02-12 18:59
Modified
2025-02-12 19:32
Severity ?
EPSS score ?
Summary
Nomad Vulnerable To Event Stream Namespace ACL Policy Bypass Through Wildcard Namespace
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0937", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-12T19:32:44.227668Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:32:54.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.9.6", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.8.10", "status": "unaffected" }, { "at": "1.7.18", "status": "unaffected" } ], "lessThan": "1.9.6", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Community and Nomad Enterprise (\"Nomad\") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Community and Nomad Enterprise (\"Nomad\") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233: Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-12T18:59:25.011Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2025-02-nomad-vulnerable-to-event-stream-namespace-acl-policy-bypass-through-wildcard-namespace/73191" } ], "source": { "advisory": "HCSEC-2025-02", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable To Event Stream Namespace ACL Policy Bypass Through Wildcard Namespace" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2025-0937", "datePublished": "2025-02-12T18:59:25.011Z", "dateReserved": "2025-01-31T17:42:01.531Z", "dateUpdated": "2025-02-12T19:32:54.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3867
Vulnerability from cvelistv5
Published
2022-11-10 05:45
Modified
2025-05-01 19:04
Severity ?
EPSS score ?
Summary
Nomad Event Stream Subscriber Using a Token with TTL Receives Updates Until Garbage Collected
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:58.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2022-26-nomad-s-event-stream-subscriber-using-acl-token-with-ttl-receive-updates-until-garbage-collected/46168" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3867", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T19:03:58.553932Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T19:04:09.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.4.1" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "vendor": "HashiCorp", "versions": [ { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.4.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2." } ], "value": "HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-10T05:45:53.550Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2022-26-nomad-s-event-stream-subscriber-using-acl-token-with-ttl-receive-updates-until-garbage-collected/46168" } ], "source": { "discovery": "INTERNAL" }, "title": "Nomad Event Stream Subscriber Using a Token with TTL Receives Updates Until Garbage Collected" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2022-3867", "datePublished": "2022-11-10T05:45:53.550Z", "dateReserved": "2022-11-04T22:54:20.822Z", "dateUpdated": "2025-05-01T19:04:09.365Z", "requesterUserId": "5311d85b-fc2e-473d-9ddd-71031e52448b", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10975
Vulnerability from cvelistv5
Published
2024-11-07 21:04
Modified
2024-11-07 21:22
Severity ?
EPSS score ?
Summary
Nomad Vulnerable To Cross-Namespace Volume Creation Abusing CSI Write Permission
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-10975", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:22:29.026938Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:22:50.668Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.9.2", "status": "affected", "version": "1.3.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.8.7", "status": "unaffected" }, { "at": "1.7.15", "status": "unaffected" } ], "lessThan": "1.9.2", "status": "affected", "version": "1.3.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Community and Nomad Enterprise (\"Nomad\") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized Container Storage Interface (CSI) volume writes. This vulnerability, identified as CVE-2024-10975, is fixed in Nomad Community Edition 1.9.2 and Nomad Enterprise 1.9.2, 1.8.7, and 1.7.15.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Community and Nomad Enterprise (\"Nomad\") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized Container Storage Interface (CSI) volume writes. This vulnerability, identified as CVE-2024-10975, is fixed in Nomad Community Edition 1.9.2 and Nomad Enterprise 1.9.2, 1.8.7, and 1.7.15." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:05:58.564Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-27-nomad-vulnerable-to-cross-namespace-volume-creation-abusing-csi-write-permission" } ], "source": { "advisory": "HCSEC-2024-27", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable To Cross-Namespace Volume Creation Abusing CSI Write Permission" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-10975", "datePublished": "2024-11-07T21:04:43.804Z", "dateReserved": "2024-11-07T19:05:40.525Z", "dateUpdated": "2024-11-07T21:22:50.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1296
Vulnerability from cvelistv5
Published
2025-03-10 18:02
Modified
2025-03-11 20:18
Severity ?
EPSS score ?
Summary
Nomad Exposes Sensitive Workload Identity and Client Secret Token in Audit Logs
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1296", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-11T20:14:30.450057Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T20:18:55.186Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad/", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.9.7", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad/", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.8.11", "status": "unaffected" }, { "at": "1.7.19", "status": "unaffected" } ], "lessThan": "1.9.7", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNomad Community and Nomad Enterprise (\u201cNomad\u201d) are vulnerable to unintentional exposure of the workload identity token and client secret token in audit logs. This vulnerability, identified as CVE-2025-1296, is fixed in Nomad Community Edition 1.9.7 and Nomad Enterprise 1.9.7, 1.8.11, and 1.7.19.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "Nomad Community and Nomad Enterprise (\u201cNomad\u201d) are vulnerable to unintentional exposure of the workload identity token and client secret token in audit logs. This vulnerability, identified as CVE-2025-1296, is fixed in Nomad Community Edition 1.9.7 and Nomad Enterprise 1.9.7, 1.8.11, and 1.7.19." } ], "impacts": [ { "capecId": "CAPEC-268", "descriptions": [ { "lang": "en", "value": "CAPEC-268: Audit Log Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-10T18:02:21.579Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2025-04-nomad-exposes-sensitive-workload-identity-and-client-secret-token-in-audit-logs/73737" } ], "source": { "advisory": "HCSEC-2025-04", "discovery": "EXTERNAL" }, "title": "Nomad Exposes Sensitive Workload Identity and Client Secret Token in Audit Logs" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2025-1296", "datePublished": "2025-03-10T18:02:21.579Z", "dateReserved": "2025-02-14T01:10:26.947Z", "dateUpdated": "2025-03-11T20:18:55.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3300
Vulnerability from cvelistv5
Published
2023-07-19 23:35
Modified
2024-10-24 19:48
Severity ?
EPSS score ?
Summary
Nomad Search API Leaks Information About CSI Plugins
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:08.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T19:48:38.832662Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-24T19:48:48.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.4.1", "status": "affected", "version": "0.11.0", "versionType": "semver" }, { "lessThanOrEqual": "1.5.6", "status": "affected", "version": "0.11.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThanOrEqual": "1.4.1", "status": "affected", "version": "0.11.0", "versionType": "semver" }, { "lessThanOrEqual": "1.5.6", "status": "affected", "version": "0.11.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP search API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. Fixed in 1.6.0, 1.5.7, and 1.4.1.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP search API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. Fixed in 1.6.0, 1.5.7, and 1.4.1." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T20:57:33.041Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272" } ], "source": { "advisory": "HCSEC-2023-22", "discovery": "INTERNAL" }, "title": "Nomad Search API Leaks Information About CSI Plugins" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2023-3300", "datePublished": "2023-07-19T23:35:26.153Z", "dateReserved": "2023-06-16T18:48:08.987Z", "dateUpdated": "2024-10-24T19:48:48.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }