Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests
References
Link | Resource |
---|---|
https://github.com/Mesh3l911/CVE-2021-44659 | Broken Link Exploit Third Party Advisory |
https://github.com/gocd/gocd | Product Third Party Advisory |
https://www.gocd.org/ | Product Vendor Advisory |
https://youtu.be/WW_a3znugl0 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
Summary | Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests |
Information
Published : 2021-12-22 18:15
Updated : 2024-08-04 05:15
NVD link : CVE-2021-44659
Mitre link : CVE-2021-44659
CVE.ORG link : CVE-2021-44659
JSON object : View
Products Affected
thoughtworks
- gocd
CWE
CWE-918
Server-Side Request Forgery (SSRF)