Skip to content

GoCD before 23.1.0 has sensitive information disclosure possible on misconfigured failed backups of non-H2 databases

Moderate
chadlwilson published GHSA-p95w-gh78-qjmv Mar 27, 2023

Package

gocd-server

Affected versions

>= 20.5.0, < 23.1.0

Patched versions

23.1.0

Description

Impact

In GoCD versions from 20.5.0 and below 23.1.0, if the server environment is not correctly configured by administrators to provide access to the relevant PostgreSQL or MySQL backup tools, the credentials for database access may be unintentionally leaked to admin alerts on the GoCD user interface.

The vulnerability is triggered only if the GoCD server host is misconfigured to have backups enabled, but does not have access to the pg_dump or mysqldump utility tools to backup the configured database type (PostgreSQL or MySQL respectively). In such cases, failure to launch the expected backup utility reports the shell environment used to attempt to launch in the server admin alert, which includes the plaintext database password supplied to the configured tool. This vulnerability does not affect backups of the default on-disk H2 database that GoCD is configured to use.

Patches

Fixed in GoCD 23.1.0.

Workarounds

Disable backups, or administrators should ensure that the required pg_dump (PostgreSQL) or mysqldump (MySQL) binaries are available on the GoCD server when backups of these database types are configured.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
4.0
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

CVE ID

CVE-2023-28630

Weaknesses

Credits