An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into an arbitrary directory of a GoCD server, but does not control the filename.
References
Link | Resource |
---|---|
https://www.gocd.org/releases/#21-3-0 | Issue Tracking Release Notes Vendor Advisory |
https://blog.sonarsource.com/gocd-vulnerability-chain | Exploit Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595 | Patch Third Party Advisory |
https://github.com/gocd/gocd/commit/c22e0428164af25d3e91baabd3f538a41cadc82f | Patch Third Party Advisory |
Configurations
Information
Published : 2022-04-14 06:15
Updated : 2022-04-26 10:01
NVD link : CVE-2021-43289
Mitre link : CVE-2021-43289
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
thoughtworks
- gocd