Sandbox Bypass Affecting github.com/hashicorp/nomad/drivers/docker package, versions >=0.9.0 <0.10.8>=0.11.0-beta1 <0.11.7>=0.12.0-beta1 <0.12.8


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (33rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMHASHICORPNOMADDRIVERSDOCKER-1039759
  • published12 Nov 2020
  • disclosed12 Nov 2020
  • creditTim Gross

Introduced: 12 Nov 2020

CVE-2020-28348  (opens in a new tab)
CWE-265  (opens in a new tab)

How to fix?

Upgrade github.com/hashicorp/nomad/drivers/docker to version 0.10.8, 0.11.7, 0.12.8 or higher.

Overview

Affected versions of this package are vulnerable to Sandbox Bypass. A vulnerability was discovered in Nomad and Nomad Enterprise (“Nomad”) such that an operator with job submission capabilities can mount the host file system of a client agent and subvert the default Docker file sandbox feature when not explicitly disabled, or when using a volume mount type.

Nomad disables host filesystem access by default in 0.12.0 and above to prevent job operators from accessing the client filesystem used to persistently store any required data on disk. The Docker task driver provides a volume mount type which can be used to access the client host filesystem from within a container, but clients must be configured to enable mounting directories outside an allocation’s path to prevent abuse from unprivileged operators.

CVSS Scores

version 3.1