Skip to content

GoCD before 21.3.0 has compromised agents vulnerable to uploading arbitrarily named file to unexpected directory (path traversal) on server

Moderate
chadlwilson published GHSA-fvvm-grvw-3wp2 May 22, 2022

Package

gocd-server

Affected versions

< 21.3.0

Patched versions

21.3.0

Description

Impact

GoCD versions before 21.3.0 are vulnerable to a path traversal vulnerability during artifact uploads from an agent to the GoCD Server, allowing a file of arbitrary name to be uploaded to directory outside the expected location, but with a final directory name that is server-determined and the attacker cannot control. The agent would need first to have been compromised by the attacker, allowing access to the credentials the agent uses to authenticate with the server.

This is a variant of vulnerability GHSA-7w55-g4hv-8v7w / CVE-2021-43289.

Patches

Fixed in GoCD 21.3.0.

Workarounds

None known.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

CVE ID

CVE-2021-43290

Weaknesses