CVE-2022-29183
low-risk
Published 2022-05-20
GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow an attacker to trick a victim into executing code which would allow the attacker to operate on, or gain control over the same resources as the victim had access to. This issue is fixed in GoCD 21.4.0. As a workaround, block access to `/go/compare/.*` prior to GoCD Server via a reverse proxy, web application firewall or equivalent, which would prevent use of the pipeline comparison function.
Do I need to act?
-
0.57% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Release Notes
https://github.com/gocd/gocd/releases/tag/21.4.0
Third Party Advisory
https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf
Release Notes
https://www.gocd.org/releases/#21-4-0
Release Notes
https://github.com/gocd/gocd/releases/tag/21.4.0
Third Party Advisory
https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf
Release Notes
https://www.gocd.org/releases/#21-4-0
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal