CVE-2023-0821: Uncontrolled Resource Consumption in Hashicorp Nomad
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47639%
CWE
Published
2/17/2023
Updated
3/7/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/hashicorp/nomad | go | >= 1.2.15, < 1.2.16 | 1.2.16 |
| github.com/hashicorp/nomad | go | >= 1.3.0, < 1.3.9 | 1.3.9 |
| github.com/hashicorp/nomad | go | >= 1.4.0, < 1.4.4 | 1.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing decompression limits in artifact handling. The key evidence is:
- getter.go's getClient function added LimitedDecompressors - proving previous lack of constraints
- artifact.go added decompression limit fields to config - showing previous absence of these safety measures
- Test changes verify zip/tar.gz/xz decompressors now have limits - indicating they operated without restrictions before These functions directly control artifact decompression configuration and would appear in stack traces during malicious artifact processing.