Externally Controlled Reference to a Resource in Another Sphere Affecting github.com/hashicorp/nomad/client/allocwatcher package, versions >=0.6.1 <1.8.3
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMHASHICORPNOMADCLIENTALLOCWATCHER-7645437
- published 15 Aug 2024
- disclosed 15 Aug 2024
- credit HashiCorp’s Product Security and Nomad R&D teams
Introduced: 15 Aug 2024
CVE-2024-7625 Open this link in a new tabHow to fix?
Upgrade github.com/hashicorp/nomad/client/allocwatcher
to version 1.8.3 or higher.
Overview
Affected versions of this package are vulnerable to Externally Controlled Reference to a Resource in Another Sphere when unarchiving within the same allocation directory. An attacker can exploit this vulnerability by writing a header that points to a symlink that lives outside of the sandbox environment.
Note:
This exploit requires first compromising the Nomad client agent at the source allocation.