Add CVE-2022-29183 for GHSA-3vvq-q4qv-x2gf

Add CVE-2022-29183 for GHSA-3vvq-q4qv-x2gf
This commit is contained in:
advisory-database[bot] 2022-05-20 19:09:56 +00:00 committed by GitHub
parent 2d86ec250d
commit a7f8f9b57c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,18 +1,98 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-29183",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Reflected XSS in GoCD"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "gocd",
"version": {
"version_data": [
{
"version_value": ">= 20.2.0, < 21.4.0"
}
]
}
}
]
},
"vendor_name": "gocd"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow an attacker to trick a victim into executing code which would allow the attacker to operate on, or gain control over the same resources as the victim had access to. This issue is fixed in GoCD 21.4.0. As a workaround, block access to `/go/compare/.*` prior to GoCD Server via a reverse proxy, web application firewall or equivalent, which would prevent use of the pipeline comparison function."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf",
"refsource": "CONFIRM",
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-3vvq-q4qv-x2gf"
},
{
"name": "https://github.com/gocd/gocd/pull/9829/commits/bda81084c0401234b168437cf35a63390e3064d1",
"refsource": "MISC",
"url": "https://github.com/gocd/gocd/pull/9829/commits/bda81084c0401234b168437cf35a63390e3064d1"
},
{
"name": "https://github.com/gocd/gocd/releases/tag/21.4.0",
"refsource": "MISC",
"url": "https://github.com/gocd/gocd/releases/tag/21.4.0"
},
{
"name": "https://www.gocd.org/releases/#21-4-0",
"refsource": "MISC",
"url": "https://www.gocd.org/releases/#21-4-0"
}
]
},
"source": {
"advisory": "GHSA-3vvq-q4qv-x2gf",
"discovery": "UNKNOWN"
}
}