Miggo Logo

CVE-2021-43415: Improper Authentication in HashiCorp Nomad

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.45673%
Published
12/10/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/hashicorp/nomadgo< 1.0.141.0.14
github.com/hashicorp/nomadgo>= 1.1.0, < 1.1.81.1.8
github.com/hashicorp/nomadgo>= 1.2.0, < 1.2.11.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation of QEMU task driver arguments. The QEMU driver's configuration processing (configureTask) and command construction (startQemu) functions did not implement an allowlist for QEMU flags prior to the patch. This allowed attackers to inject arguments like -drive to bypass image path restrictions. The fix introduced an args_allowlist configuration, confirming these functions were the attack surface. While exact function names are inferred from Nomad's architecture, the QEMU driver's argument handling is unequivocally implicated based on the vulnerability description and remediation guidance.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*i*orp Nom** *n* Nom** *nt*rpris* up to *.*.**, *.*.*, *n* *.*.*, wit* t** Q*MU t*sk *riv*r *n**l**, *llow** *ut**nti**t** us*rs wit* jo* su*mission **p**iliti*s to *yp*ss t** *on*i*ur** *llow** im*** p*t*s. *ix** in *.*.**, *.*.*, *n* *.*.*.

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt v*li**tion o* Q*MU t*sk *riv*r *r*um*nts. T** Q*MU *riv*r's *on*i*ur*tion pro**ssin* (*on*i*ur*T*sk) *n* *omm*n* *onstru*tion (st*rtQ*mu) *un*tions *i* not impl*m*nt *n *llowlist *or Q*MU *l**s prior to t** p