Thoughtworks

Gocd

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 14.10.2022 19:15:18
  • Zuletzt bearbeitet 21.11.2024 07:18:00

GoCD is a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for continuous delivery of your product. GoCD versions from 19.2.0 to 19.10.0 (inclusive) are subject to a timing attack in validation of access...

  • EPSS 0.04%
  • Veröffentlicht 07.09.2022 23:15:14
  • Zuletzt bearbeitet 21.11.2024 07:12:21

GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user w...

  • EPSS 5.3%
  • Veröffentlicht 20.05.2022 20:15:10
  • Zuletzt bearbeitet 21.11.2024 06:58:39

GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capa...

  • EPSS 0.57%
  • Veröffentlicht 20.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:58:39

GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow ...

  • EPSS 0.61%
  • Veröffentlicht 20.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:58:39

GoCD is a continuous delivery server. GoCD versions 19.11.0 through 21.4.0 (inclusive) are vulnerable to a Document Object Model (DOM)-based cross-site scripting attack via a pipeline run's Stage Details > Graphs tab. It is possible for a malicious s...

Exploit
  • EPSS 4.23%
  • Veröffentlicht 14.04.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:29:00

An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory th...

Exploit
  • EPSS 1.56%
  • Veröffentlicht 14.04.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:29:00

An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into an arbitrary directory of a GoCD server, but does not control the filename.

Exploit
  • EPSS 1.23%
  • Veröffentlicht 14.04.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:29:00

An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker in control of a GoCD Agent can plant malicious JavaScript into a failed Job Report.

Exploit
  • EPSS 2.41%
  • Veröffentlicht 14.04.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:29:00

An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker with privileges to create a new pipeline on a GoCD server can abuse a command-line injection in the Git URL "Test Connection" feature to execute arbitrary code.

Exploit
  • EPSS 91.45%
  • Veröffentlicht 14.04.2022 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:00

An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.