CVE-2022-30324

9.8 CRITICAL

📋 TL;DR

This vulnerability in HashiCorp Nomad and Nomad Enterprise allows attackers to escalate privileges on client agent hosts by exploiting go-getter vulnerabilities through the artifact stanza in submitted jobs. It affects versions 0.2.0 up to 1.3.0, enabling unauthorized access and control over affected systems. Users running these versions are at risk if they process untrusted job submissions.

💻 Affected Systems

Products:
  • HashiCorp Nomad
  • HashiCorp Nomad Enterprise
Versions: 0.2.0 up to 1.3.0
Operating Systems: All supported operating systems where Nomad runs
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in the default configuration when using the artifact stanza in jobs; no special settings are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of client agent hosts, allowing attackers to execute arbitrary code, access sensitive data, and pivot to other systems in the network.

🟠

Likely Case

Privilege escalation leading to unauthorized control over client agents, potentially disrupting job execution and exposing internal resources.

🟢

If Mitigated

Limited impact if job submissions are restricted to trusted sources and network segmentation is enforced, reducing exposure to exploitation.

🌐 Internet-Facing: HIGH if Nomad clients are exposed to the internet, as attackers can submit malicious jobs remotely without authentication in some configurations.
🏢 Internal Only: HIGH due to the potential for internal attackers or compromised systems to exploit the vulnerability within the network, leading to widespread privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via job submissions, and while no public proof-of-concept is confirmed, the vulnerability's nature makes weaponization likely in real-world attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.14, 1.2.8, and 1.3.1

Vendor Advisory: https://discuss.hashicorp.com/t/hcsec-2022-14-nomad-impacted-by-go-getter-vulnerabilities/39932

Restart Required: Yes

Instructions:

1. Identify the current Nomad version using 'nomad version'. 2. Upgrade to a fixed version (1.1.14, 1.2.8, or 1.3.1) via package manager or manual download from HashiCorp. 3. Restart Nomad services to apply the patch.

🔧 Temporary Workarounds

Restrict Job Submissions

all

Limit job submissions to trusted users or sources to reduce the attack surface.

Configure Nomad ACLs or policies to enforce strict access controls on job submissions.

Disable Artifact Downloads

all

Prevent the use of artifact stanzas in jobs if not required, blocking the exploitation vector.

Modify Nomad configuration to disable artifact downloads or use job validation to reject such stanzas.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Nomad clients from sensitive systems, limiting lateral movement.
  • Enhance monitoring and logging for suspicious job submissions and artifact downloads to enable rapid detection and response.

🔍 How to Verify

Check if Vulnerable:

Run 'nomad version' and check if the version is between 0.2.0 and 1.3.0, excluding fixed versions 1.1.14, 1.2.8, and 1.3.1.

Check Version:

nomad version

Verify Fix Applied:

After patching, run 'nomad version' to confirm the version is 1.1.14, 1.2.8, or 1.3.1, and test job submissions with artifact stanzas to ensure no privilege escalation occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual job submissions with artifact stanzas from untrusted sources
  • Errors or warnings related to go-getter or privilege escalation in Nomad logs

Network Indicators:

  • Unexpected network connections from Nomad clients to external artifact sources
  • Anomalous traffic patterns during job processing

SIEM Query:

source="nomad.log" AND (artifact* OR go-getter) AND (error OR warning)

🔗 References

📤 Share & Export