Vulnerabilities (CVE)

Filtered by vendor Thoughtworks Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-44659 1 Thoughtworks 1 Gocd 2022-05-13 7.5 HIGH 9.8 CRITICAL
** DISPUTED ** Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests.
CVE-2021-43290 1 Thoughtworks 1 Gocd 2022-04-26 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory that they can't control.
CVE-2021-43289 1 Thoughtworks 1 Gocd 2022-04-26 5.0 MEDIUM 7.5 HIGH
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into an arbitrary directory of a GoCD server, but does not control the filename.
CVE-2021-43288 1 Thoughtworks 1 Gocd 2022-04-22 3.5 LOW 5.4 MEDIUM
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker in control of a GoCD Agent can plant malicious JavaScript into a failed Job Report.
CVE-2021-43286 1 Thoughtworks 1 Gocd 2022-04-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker with privileges to create a new pipeline on a GoCD server can abuse a command-line injection in the Git URL "Test Connection" feature to execute arbitrary code.
CVE-2021-43287 1 Thoughtworks 1 Gocd 2022-04-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.
CVE-2022-24832 1 Thoughtworks 1 Gocd 2022-04-19 4.9 MEDIUM 6.8 MEDIUM
GoCD is an open source a continuous delivery server. The bundled gocd-ldap-authentication-plugin included with the GoCD Server fails to correctly escape special characters when using the username to construct LDAP queries. While this does not directly allow arbitrary LDAP data exfiltration, it can allow an existing LDAP-authenticated GoCD user with malicious intent to construct and execute malicious queries, allowing them to deduce facts about other users or entries within the LDAP database (e.g alternate fields, usernames, hashed passwords etc) through brute force mechanisms. This only affects users who have a working LDAP authorization configuration enabled on their GoCD server, and only is exploitable by users authenticating using such an LDAP configuration. This issue has been fixed in GoCD 22.1.0, which is bundled with gocd-ldap-authentication-plugin v2.2.0-144.
CVE-2021-25924 1 Thoughtworks 1 Gocd 2021-04-06 9.3 HIGH 8.8 HIGH
In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field.