Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-7956: Privilege escalation due to incorrect certificate validation for role/region #7003

Closed
schmichael opened this issue Jan 28, 2020 · 1 comment · Fixed by #7023
Assignees

Comments

@schmichael
Copy link
Member

schmichael commented Jan 28, 2020

Vulnerability ID: CVE-2020-7956
Versions: Previous versions of Nomad and Nomad Enterprise; fixed in 0.10.3.

Nomad 0.10.3 includes a fix for a privilege escalation vulnerability in validating TLS certificates for RPC with mTLS. Nomad RPC endpoints validated that TLS client certificates had not expired and were signed by the same CA as the Nomad node, but did not correctly check the certificate's name for the role and region as described in the Securing Nomad with TLS guide. This allows trusted operators with a client certificate signed by the CA to send RPC calls as a Nomad client or server node, bypassing access control and accessing any secrets available to a client.

Nomad clusters configured for mTLS following the Securing Nomad with TLS guide or the Vault PKI Secrets Engine Integration guide
should already have certificates that will pass validation. Before upgrading to Nomad 0.10.3, operators using mTLS with verify_server_hostname = true should confirm that the common name or SAN of all Nomad client node certs is client..nomad, and that the common name or SAN of all Nomad server node certs is server..nomad.

@schmichael schmichael self-assigned this Jan 28, 2020
@preetapan preetapan changed the title Reserved Issue Number CVE-2020-7956: Privilege escalation due to incorrect certificate validation for role/region Jan 30, 2020
@github-actions
Copy link

I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 11, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant