CVE-2022-39311
Compromised agents may be able to execute remote code on GoCD Server
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GoCD is a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for continuous delivery of your product. GoCD versions prior to 21.1.0 are vulnerable to remote code execution on the server from a malicious or compromised agent. The Spring RemoteInvocation endpoint exposed agent communication and allowed deserialization of arbitrary java objects, as well as subsequent remote code execution. Exploitation requires agent-level authentication, thus an attacker would need to either compromise an existing agent, its network communication or register a new agent to practically exploit this vulnerability. This issue is fixed in GoCD version 21.1.0. There are currently no known workarounds.
GoCD es un servidor de entrega continua. GoCD le ayuda a automatizar y agilizar el ciclo de construcción-prueba-lanzamiento para la entrega continua de su producto. Las versiones de GoCD anteriores a la 21.1.0 son vulnerables a la ejecución remota de código en el servidor desde un agente malicioso o comprometido. El endpoint de Spring RemoteInvocation exponía la comunicación con el agente y permitía la deserialización de objetos java arbitrarios, así como la posterior ejecución de código remoto. La explotación requiere autenticación a nivel de agente, por lo que un atacante necesitaría comprometer un agente existente, su comunicación de red o registrar un nuevo agente para explotar prácticamente esta vulnerabilidad. Este problema ha sido corregido en GoCD versión 21.1.0. Actualmente no se presentan mitigaciones conocidas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-02 CVE Reserved
- 2022-10-14 CVE Published
- 2024-08-02 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/gocd/gocd/commit/7b88b70d6f7f429562d5cab49a80ea856e34cdc8 | 2022-10-19 | |
https://github.com/gocd/gocd/security/advisories/GHSA-2hjh-3p3p-8hcm | 2022-10-19 |
URL | Date | SRC |
---|---|---|
https://www.gocd.org/releases/#21-1-0 | 2022-10-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Thoughtworks Search vendor "Thoughtworks" | Gocd Search vendor "Thoughtworks" for product "Gocd" | < 21.1.0 Search vendor "Thoughtworks" for product "Gocd" and version " < 21.1.0" | - |
Affected
|