Skip to content

GoCD before 21.1.0 has server secret encryption/decryption key accidentally leaked to agents during material serialization

Moderate
chadlwilson published GHSA-f9qg-xcxq-cgv9 Oct 14, 2022

Package

gocd-server

Affected versions

< 21.1.0

Patched versions

21.1.0

Description

Impact

GoCD versions prior to 21.1.0 leak the symmetric key used to encrypt/decrypt any secure variables/secrets in GoCD configuration to authenticated agents. A malicious/compromised agent may then expose that key from memory, and potentially allow an attacker the ability to decrypt secrets intended for other agents/environments if they also are able to obtain access to encrypted configuration values from the GoCD server. Users who do not use secret variables or store passwords/credentials for connectivity with external systems/source control servers within the GoCD server configuration are unaffected by this vulnerability.

Patches

Fixed in GoCD 21.1.0.

Workarounds

None known.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2022-39309

Credits