Skip to content

GoCD before 21.3.0 has compromised agents vulnerable to uploading file with pre-determined name to arbitrary directory (path traversal) on server

Moderate
chadlwilson published GHSA-7w55-g4hv-8v7w May 22, 2022

Package

gocd-server

Affected versions

< 21.3.0

Patched versions

21.3.0

Description

Impact

GoCD versions before 21.3.0 are vulnerable to a path traversal vulnerability during artifact uploads from an agent to the GoCD Server, allowing files to be uploaded to an arbitrary directory of the attacker's choice, using a server-determined filename. To exploit this vulnerability, the agent would need first to have been compromised by the attacker, allowing access to the credentials the agent uses to authenticate with the server.

Patches

Fixed in GoCD 21.3.0.

Workarounds

None known.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

CVE ID

CVE-2021-43289

Weaknesses