cve-2024-7625
Vulnerability from cvelistv5
Published
2024-08-14 23:20
Modified
2025-01-09 19:19
Severity ?
EPSS score ?
Summary
Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HashiCorp | Nomad | |
HashiCorp | Nomad Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7625", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:21:56.859263Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-09T19:19:01.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "0.6.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux" ], "product": "Nomad Enterprise", "repo": "https://github.com/hashicorp/nomad", "vendor": "HashiCorp", "versions": [ { "changes": [ { "at": "1.6.14", "status": "unaffected" }, { "at": "1.7.11", "status": "unaffected" } ], "lessThan": "1.8.3", "status": "affected", "version": "0.6.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability.\u003c/p\u003e\u003cbr/\u003e" } ], "value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-130", "descriptions": [ { "lang": "en", "value": "CAPEC-130: Excessive Allocation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "CWE-610: Externally Controlled Reference to a Resource in Another Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:21:32.859Z", "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp" }, "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2024-17-nomad-vulnerable-to-allocation-directory-escape-on-non-existing-file-paths-through-archive-unpacking/69293" } ], "source": { "advisory": "HCSEC-2024-17", "discovery": "INTERNAL" }, "title": "Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking" } }, "cveMetadata": { "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "assignerShortName": "HashiCorp", "cveId": "CVE-2024-7625", "datePublished": "2024-08-14T23:20:17.888Z", "dateReserved": "2024-08-08T19:14:29.366Z", "dateUpdated": "2025-01-09T19:19:01.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-7625\",\"sourceIdentifier\":\"security@hashicorp.com\",\"published\":\"2024-08-15T00:15:13.127\",\"lastModified\":\"2024-09-25T16:15:11.307\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability.\"},{\"lang\":\"es\",\"value\":\" En HashiCorp Nomad y Nomad Enterprise desde 0.6.1 hasta 1.16.13, 1.7.10 y 1.8.2, el proceso de descompresi\u00f3n del archivo es vulnerable a escrituras fuera del directorio de asignaci\u00f3n durante la migraci\u00f3n de directorios de asignaci\u00f3n cuando varios encabezados de archivo apuntan al mismo archivo. . Esta vulnerabilidad, CVE-2024-7625, se solucion\u00f3 en Nomad 1.6.14, 1.7.11 y 1.8.3. El acceso o el compromiso del agente del cliente Nomad en la asignaci\u00f3n de origen primero es un requisito previo para aprovechar esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@hashicorp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.3,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"security@hashicorp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-610\"}]}],\"references\":[{\"url\":\"https://discuss.hashicorp.com/t/hcsec-2024-17-nomad-vulnerable-to-allocation-directory-escape-on-non-existing-file-paths-through-archive-unpacking/69293\",\"source\":\"security@hashicorp.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.