An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker with privileges to create a new pipeline on a GoCD server can abuse a command-line injection in the Git URL "Test Connection" feature to execute arbitrary code.
References
Link | Resource |
---|---|
https://blog.sonarsource.com/gocd-vulnerability-chain | Exploit Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/2b77b533abcbb79c8fc758dec9984305dc1ade42 | Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | Patch Third Party Advisory |
https://www.gocd.org/releases/#21-3-0 | Issue Tracking Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-14T12:55:51
Updated: 2022-04-14T12:55:51
Reserved: 2021-11-02T00:00:00
Link: CVE-2021-43286
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-14T13:15:11.417
Modified: 2022-04-21T20:39:21.970
Link: CVE-2021-43286
JSON object: View
Redhat Information
No data.
CWE