
Cloud Vulnerability DB
A community-led vulnerabilities database
GoCD versions prior to 21.1.0 contained a vulnerability that allowed one authenticated agent to impersonate another agent and receive work packages intended for other agents. This vulnerability (CVE-2022-39310) was discovered due to broken access control and incorrect validation of agent tokens within the GoCD server (GitHub Advisory).
The vulnerability stems from improper validation of agent UUIDs during remoting requests, which allowed authenticated agents to act on behalf of other agents. The issue received a CVSS v3.1 base score of 4.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability (GitHub Advisory).
The vulnerability could lead to information disclosure as work packages may contain sensitive information such as credentials intended only for specific jobs running against specific agent environments. This meant that if one agent was compromised, an attacker could potentially access decrypted secrets intended for builds on other agents (GitHub Advisory).
The vulnerability was fixed in GoCD version 21.1.0. The fix involved introducing a custom HttpInvokerServiceExporter that validates the UUID from the X-Agent-GUID header matches the UUID from the deserialized AgentRuntimeInfo and AgentIdentifier objects. No known workarounds were available for earlier versions (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."