-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2019-12741: ACL Privilege Escalation in Nomad #6430
Comments
Apologies for replying to an old issue, but can you verify that CVE ID please? https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12741 The vulnerability described in this issue sounds considerably different than a reflected XSS in HAPI-FHIR and I don't see that software included in Nomad based on a quick search. Thanks! |
@attritionorg that does look wrong to me. The other CVEs from the same release show up as "reserved" on Mitre too. I'd need to follow up with our product security folks (cc @picatz) to dig up our internal records on that, as these versions are out of support for us and so not really on our radar right now. |
@tgross Appreciate the quick follow-up. It's rare to see a duplicate assignment across products like this, as dupes tend to be within the same organization. |
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues. |
Following a user report, we discovered that in federated Nomad clusters with ACL replication enabled, a user with
agent
capability can gain management-level access in all federated clusters. This vulnerability affects Nomad versions since 0.7.0, both OSS and Enterprise.This issue outlines details about this vulnerability and describes steps for remediation.
Background
Nomad supports federating multiple regions, with one serving as the authoritative region for the ACL system. Servers in non-authoritative regions replicate ACL policies and tokens using a management token from the authoritative region to be configured in the acl block.
Nomad agent exposes its state and configuration through
/v1/agent/self
endpoint, and it returns the replication token unredacted. An attacker withAgent.Read
can lookup the replication token, and escalate their privilege to full management tokens on all regions. They may use their elevated access to create further management tokens or lookup info of other acl tokens for further use.This vulnerability constitutes a serious unintentional leak of sensitive configuration, and Nomad 0.9.6 will return “” as the value for this token when querying the API.
Remediation
Operators should upgrade to 0.9.6. Only Nomad servers need the replication token set, so operators should also verify clients don’t have this configuration option set to limit the spread of sensitive tokens. If only the servers have the replication token set, then only the servers need to be updated to patch the vulnerability. It is advised that operators rotate the replication token if set.
Operators can also audit their policies and drop agent capabilities, except for those with effectively management-level access.
The text was updated successfully, but these errors were encountered: