An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory that they can't control.
References
Link | Resource |
---|---|
https://blog.sonarsource.com/gocd-vulnerability-chain | Exploit Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595 | Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/c22e0428164af25d3e91baabd3f538a41cadc82f | Patch Third Party Advisory |
https://www.gocd.org/releases/#21-3-0 | Issue Tracking Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-14T12:55:19
Updated: 2022-04-14T12:55:19
Reserved: 2021-11-02T00:00:00
Link: CVE-2021-43290
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-14T13:15:11.540
Modified: 2022-04-26T17:13:18.550
Link: CVE-2021-43290
JSON object: View
Redhat Information
No data.
CWE