CVE-2021-43287
HIGH EXPLOITED NUCLEIThoughtWorks GoCD <21.3.0 - Info Disclosure
Title source: llmDescription
An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.
Exploits (1)
Nuclei Templates (1)
Pre-Auth Takeover of Build Pipelines in GoCD
HIGHby dhiyaneshDk
Shodan:
http.title:"Create a pipeline - Go" html:"GoCD Version" || http.html:"gocd version" || http.title:"create a pipeline - go" html:"gocd version"
FOFA:
title="create a pipeline - go" html:"gocd version" || body="gocd version"
References (3)
Scores
CVSS v3
7.5
EPSS
0.8683
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-05-02
CWE
CWE-200
Status
published
Products (1)
thoughtworks/gocd
< 21.3.0
Published
Apr 14, 2022
Tracked Since
Feb 18, 2026