CVE-2022-31683
Concourse CI vulnerability analysis and mitigation

Overview

CVE-2022-31683 is an authorization bypass vulnerability discovered in Concourse versions 7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9. The vulnerability was disclosed on December 19, 2022. The issue allows a Concourse user to bypass team scope checks by sending a request with a specially crafted body including :team_name parameter to gain unauthorized access to resources belonging to other teams (GitHub Advisory).

Technical details

The vulnerability exists in multiple POST/PUT endpoints containing :team_name in the URL. The issue stems from using FormValue to parse team_name in the request, which allows body parameters to take precedence over URL query string values. This enables HTTP parameter pollution where an authenticated user belonging to one team can manipulate the team_name parameter to access resources of other teams. The vulnerability has a CVSS v3.1 Base Score of 5.4 (Medium) with attack vector being Network, requiring Low privileges and No user interaction (AttackerKB).

Impact

An authenticated user with membership in any team can exploit this vulnerability to gain unauthorized access to resources belonging to other teams. The exploitable actions include pausing/unpausing pipelines and jobs, scheduling jobs, exposing/hiding pipelines, renaming pipelines, archiving pipelines, and managing resource versions (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Concourse versions 6.7.9 and 7.8.3, released on October 12, 2022. The fix involves changing the parameter parsing method from FormValue to URL.Query().Get() across multiple scope handlers to prevent parameter pollution. No workarounds are available for existing versions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Concourse CI vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-5415CRITICAL10
  • Concourse CIConcourse CI
  • github.com/concourse/concourse
NoYesAug 12, 2020
CVE-2019-3792HIGH7.5
  • Concourse CIConcourse CI
  • github.com/concourse/concourse
NoYesApr 01, 2019
CVE-2019-3803HIGH7.5
  • Concourse CIConcourse CI
  • github.com/concourse/concourse
NoYesJan 12, 2019
CVE-2020-5409MEDIUM6.1
  • Concourse CIConcourse CI
  • cpe:2.3:a:pivotal_software:concourse
NoYesMay 14, 2020
CVE-2022-31683MEDIUM5.4
  • Concourse CIConcourse CI
  • github.com/concourse/concourse
NoYesDec 19, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management