CVE-2021-43287

HIGH EXPLOITED NUCLEI

ThoughtWorks GoCD <21.3.0 - Info Disclosure

Title source: llm

Description

An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.

Exploits (1)

nomisec WORKING POC 2 stars
by Wrin9 · remote
https://github.com/Wrin9/CVE-2021-43287

Nuclei Templates (1)

Pre-Auth Takeover of Build Pipelines in GoCD
HIGHby dhiyaneshDk
Shodan: http.title:"Create a pipeline - Go" html:"GoCD Version" || http.html:"gocd version" || http.title:"create a pipeline - go" html:"gocd version"
FOFA: title="create a pipeline - go" html:"gocd version" || body="gocd version"

Scores

CVSS v3 7.5
EPSS 0.8683
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-05-02
CWE
CWE-200
Status published
Products (1)
thoughtworks/gocd < 21.3.0
Published Apr 14, 2022
Tracked Since Feb 18, 2026