Skip to content

GoCD before 21.1.0 has compromised agents able to execute remote code on GoCD Server

Critical
chadlwilson published GHSA-2hjh-3p3p-8hcm Oct 14, 2022

Package

gocd-server

Affected versions

< 21.1.0

Patched versions

21.1.0

Description

Impact

GoCD versions prior to 21.1.0 are vulnerable to remote code execution on the server from a malicious or compromised agent. The Spring RemoteInvocation endpoint exposed for agent communication allowed deserialization of arbitrary java objects, and subsequent remote code execution. Exploitation requires agent-level authentication, thus an attacker would need to either compromise an existing agent, its network communication or register a new agent to practically exploit this vulnerability.

Patches

Fixed in GoCD 21.1.0.

Workarounds

None known.

References

For more information

If you have any questions or comments about this advisory:

Severity

Critical
9.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2022-39311

Weaknesses

Credits