CVE-2022-30324: Privilege escalation in Hashicorp Nomad
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61038%
CWE
-
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/hashicorp/nomad | go | >= 0.2.0, < 1.1.14 | 1.1.14 |
| github.com/hashicorp/nomad | go | >= 1.2.0, < 1.2.8 | 1.2.8 |
| github.com/hashicorp/nomad | go | >= 1.3.0, < 1.3.1 | 1.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Nomad's artifact subsystem using vulnerable go-getter versions. Key functions are: 1) The ArtifactHook's download method that initiates artifact retrieval, and 2) The go-getter wrapper that interfaces with the vulnerable library. These functions inherited go-getter's flaws (CVE-2022-26945 et al) allowing path traversal and protocol injection. The artifact stanza processing pipeline would pass user-controlled input to these functions without adequate validation, enabling client host compromise. While exact line numbers aren't visible, Nomad's architecture documents and HashiCorp's bulletin confirm the artifact subsystem's reliance on go-getter makes these core functions the attack surface.