Vulnerability CVE-2021-43286


Published: 2022-04-14

Description:
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker with privileges to create a new pipeline on a GoCD server can abuse a command-line injection in the Git URL "Test Connection" feature to execute arbitrary code.

Type:

CWE-77

(Improper Neutralization of Special Elements used in a Command ('Command Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Thoughtworks -> GOCD 

 References:
https://www.gocd.org/releases/#21-3-0
https://github.com/gocd/gocd/commit/2b77b533abcbb79c8fc758dec9984305dc1ade42
https://github.com/gocd/gocd/commit/6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
https://blog.sonarsource.com/gocd-vulnerability-chain

Copyright 2024, cxsecurity.com

 

Back to Top