CVE-2022-36088

MEDIUM

GoCD <22.2.0 - Privilege Escalation

Title source: llm
STIX 2.1

Description

GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions.

References (4)

Core 4
Core References
Mitigation, Third Party Advisory x_refsource_confirm
https://github.com/gocd/gocd/security/advisories/GHSA-gpv4-xqhc-5vcj
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/gocd/gocd/releases/tag/22.2.0
Release Notes, Third Party Advisory x_refsource_misc
https://www.gocd.org/releases/#22-2-0

Scores

CVSS v3 5.0
EPSS 0.0004
EPSS Percentile 10.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-284 CWE-269
Status published
Products (1)
thoughtworks/gocd < 22.2.0
Published Sep 07, 2022
Tracked Since Feb 18, 2026