Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests
References
| Link | Resource |
|---|---|
| https://github.com/Mesh3l911/CVE-2021-44659 | Broken Link Exploit Third Party Advisory |
| https://github.com/gocd/gocd | Product Third Party Advisory |
| https://www.gocd.org/ | Product Vendor Advisory |
| https://youtu.be/WW_a3znugl0 | Exploit Third Party Advisory |
| https://github.com/Mesh3l911/CVE-2021-44659 | Broken Link Exploit Third Party Advisory |
| https://github.com/gocd/gocd | Product Third Party Advisory |
| https://www.gocd.org/ | Product Vendor Advisory |
| https://youtu.be/WW_a3znugl0 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Mesh3l911/CVE-2021-44659 - Broken Link, Exploit, Third Party Advisory | |
| References | () https://github.com/gocd/gocd - Product, Third Party Advisory | |
| References | () https://www.gocd.org/ - Product, Vendor Advisory | |
| References | () https://youtu.be/WW_a3znugl0 - Exploit, Third Party Advisory |
07 Nov 2023, 03:39
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests |
Information
Published : 2021-12-22 18:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44659
Mitre link : CVE-2021-44659
CVE.ORG link : CVE-2021-44659
JSON object : View
Products Affected
thoughtworks
- gocd
CWE
CWE-918
Server-Side Request Forgery (SSRF)
