Miggo Logo

CVE-2023-0821: Uncontrolled Resource Consumption in Hashicorp Nomad

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.47639%
Published
2/17/2023
Updated
3/7/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/hashicorp/nomadgo>= 1.2.15, < 1.2.161.2.16
github.com/hashicorp/nomadgo>= 1.3.0, < 1.3.91.3.9
github.com/hashicorp/nomadgo>= 1.4.0, < 1.4.41.4.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing decompression limits in artifact handling. The key evidence is:

  1. getter.go's getClient function added LimitedDecompressors - proving previous lack of constraints
  2. artifact.go added decompression limit fields to config - showing previous absence of these safety measures
  3. Test changes verify zip/tar.gz/xz decompressors now have limits - indicating they operated without restrictions before These functions directly control artifact decompression configuration and would appear in stack traces during malicious artifact processing.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*i*orp Nom** *n* Nom** *nt*rpris* *.*.** up to *.*.*, *n* *.*.* jo*s usin* * m*li*iously *ompr*ss** *rti***t st*nz* sour** **n **us* *x**ssiv* *isk us***. *ix** in *.*.**, *.*.*, *n* *.*.*.

Reasoning

T** vuln*r**ility st*ms *rom missin* ***ompr*ssion limits in *rti***t **n*lin*. T** k*y *vi**n** is: *. **tt*r.*o's **t*li*nt *un*tion ***** Limit*****ompr*ssors - provin* pr*vious l**k o* *onstr*ints *. *rti***t.*o ***** ***ompr*ssion limit *i*l*s t