Pivotal Software

Concourse

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Published 19.12.2022 16:15:11
  • Last modified 16.04.2025 14:15:21

Concourse (7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9) contains an authorization bypass issue. A Concourse user can send a request with body including :team_name=team2 to bypass team scope check to gain access to certain resources belong to any ot...

  • EPSS 0.26%
  • Published 12.08.2020 17:15:12
  • Last modified 21.11.2024 05:34:07

Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse...

  • EPSS 0.67%
  • Published 14.05.2020 00:15:11
  • Last modified 21.11.2024 05:34:06

Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow. A remote unauthenticated attacker could convince a user to click on a link using the OAuth redirect link with an untrusted website and gain acc...

  • EPSS 0.36%
  • Published 01.04.2019 21:30:43
  • Last modified 21.11.2024 04:42:33

Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.

  • EPSS 0.17%
  • Published 12.01.2019 00:29:00
  • Last modified 21.11.2024 04:42:34

Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.

  • EPSS 0.56%
  • Published 19.12.2018 22:29:00
  • Last modified 21.11.2024 03:51:28

Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain acc...

  • EPSS 0.33%
  • Published 13.03.2018 20:29:00
  • Last modified 21.11.2024 03:59:25

Pivotal Concourse after 2018-03-05 might allow remote attackers to have an unspecified impact, if a customer obtained the Concourse software from a DNS domain that is no longer controlled by Pivotal. The original domain for the Concourse CI (concours...