From d576a3058cdddc7ff944bf344cc5018bbbba08c4 Mon Sep 17 00:00:00 2001 From: Zvonimir Pavlinovic Date: Thu, 4 Apr 2024 18:14:47 +0000 Subject: [PATCH] data/reports: add GO-2024-2670.yaml Aliases: CVE-2023-3072, GHSA-rpvr-38xv-xvxq Fixes golang/vulndb#2670 Change-Id: I46b19f27e158e894c212486f1523563d1dce6f8e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/576556 Reviewed-by: Tatiana Bradley TryBot-Result: Gopher Robot Auto-Submit: Zvonimir Pavlinovic Run-TryBot: Zvonimir Pavlinovic LUCI-TryBot-Result: Go LUCI --- data/osv/GO-2024-2670.json | 54 ++++++++++++++++++++++++++++++++++ data/reports/GO-2024-2670.yaml | 22 ++++++++++++++ 2 files changed, 76 insertions(+) create mode 100644 data/osv/GO-2024-2670.json create mode 100644 data/reports/GO-2024-2670.yaml diff --git a/data/osv/GO-2024-2670.json b/data/osv/GO-2024-2670.json new file mode 100644 index 00000000..24834e28 --- /dev/null +++ b/data/osv/GO-2024-2670.json @@ -0,0 +1,54 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2024-2670", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2023-3072", + "GHSA-rpvr-38xv-xvxq" + ], + "summary": "ACL security vulnerability in github.com/hashicorp/nomad", + "details": "An ACL policy using a block without label can be applied to unexpected resources in Nomad, a distributed, highly available scheduler designed for effortless operations and management of applications.", + "affected": [ + { + "package": { + "name": "github.com/hashicorp/nomad", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0.7.0" + }, + { + "fixed": "1.4.11" + }, + { + "introduced": "1.5.0" + }, + { + "fixed": "1.5.6" + } + ] + } + ], + "ecosystem_specific": {} + } + ], + "references": [ + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270" + } + ], + "credits": [ + { + "name": "anonymous4ACL24" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2024-2670" + } +} \ No newline at end of file diff --git a/data/reports/GO-2024-2670.yaml b/data/reports/GO-2024-2670.yaml new file mode 100644 index 00000000..17b4aead --- /dev/null +++ b/data/reports/GO-2024-2670.yaml @@ -0,0 +1,22 @@ +id: GO-2024-2670 +modules: + - module: github.com/hashicorp/nomad + versions: + - introduced: 0.7.0 + fixed: 1.4.11 + - introduced: 1.5.0 + fixed: 1.5.6 + vulnerable_at: 1.5.5 +summary: ACL security vulnerability in github.com/hashicorp/nomad +description: |- + An ACL policy using a block without label can be applied to unexpected resources + in Nomad, a distributed, highly available scheduler designed for effortless + operations and management of applications. +cves: + - CVE-2023-3072 +ghsas: + - GHSA-rpvr-38xv-xvxq +credits: + - anonymous4ACL24 +references: + - web: https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270