CVE-2022-29183

GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow an attacker to trick a victim into executing code which would allow the attacker to operate on, or gain control over the same resources as the victim had access to. This issue is fixed in GoCD 21.4.0. As a workaround, block access to `/go/compare/.*` prior to GoCD Server via a reverse proxy, web application firewall or equivalent, which would prevent use of the pipeline comparison function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*

History

06 Jun 2022, 15:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
First Time Thoughtworks
Thoughtworks gocd
CPE cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
References (MISC) https://www.gocd.org/releases/#21-4-0 - (MISC) https://www.gocd.org/releases/#21-4-0 - Release Notes, Vendor Advisory
References (MISC) https://github.com/gocd/gocd/pull/9829/commits/bda81084c0401234b168437cf35a63390e3064d1 - (MISC) https://github.com/gocd/gocd/pull/9829/commits/bda81084c0401234b168437cf35a63390e3064d1 - Patch
References (CONFIRM) https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf - (CONFIRM) https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf - Third Party Advisory
References (MISC) https://github.com/gocd/gocd/releases/tag/21.4.0 - (MISC) https://github.com/gocd/gocd/releases/tag/21.4.0 - Release Notes, Third Party Advisory

20 May 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-20 19:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-29183

Mitre link : CVE-2022-29183

CVE.ORG link : CVE-2022-29183


JSON object : View

Products Affected

thoughtworks

  • gocd
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')