Description
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory that they can't control.
References (4)
Core 4
Core References
Issue Tracking, Release Notes, Vendor Advisory x_refsource_misc
https://www.gocd.org/releases/#21-3-0
Patch, Third Party Advisory x_refsource_misc
https://github.com/gocd/gocd/commit/4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595
Patch, Third Party Advisory x_refsource_misc
https://github.com/gocd/gocd/commit/c22e0428164af25d3e91baabd3f538a41cadc82f
Exploit, Patch, Third Party Advisory x_refsource_misc
https://blog.sonarsource.com/gocd-vulnerability-chain
Scores
CVSS v3
9.8
EPSS
0.0366
EPSS Percentile
87.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (1)
thoughtworks/gocd
< 21.3.0
Published
Apr 14, 2022
Tracked Since
Feb 18, 2026