CVE-2022-29182 Vulnerability Details

  /     /     /  

CVE-2022-29182 Metadata Quick Info

CVE Published: 20/05/2022 | CVE Updated: 03/08/2024 | CVE Year: 2022
Source: GitHub_M | Vendor: gocd | Product: gocd
Status : PUBLISHED

CVE-2022-29182 Description

GoCD is a continuous delivery server. GoCD versions 19.11.0 through 21.4.0 (inclusive) are vulnerable to a Document Object Model (DOM)-based cross-site scripting attack via a pipeline run\'s Stage Details > Graphs tab. It is possible for a malicious script on a attacker-hosted site to execute script that will run within the user\'s browser context and GoCD session via abuse of a messaging channel used for communication between with the parent page and the stage details graph\'s iframe. This could allow an attacker to steal a GoCD user\'s session cookies and/or execute malicious code in the user\'s context. This issue is fixed in GoCD 22.1.0. There are currently no known workarounds.

Metrics

CVSS Version: 3.1 | Base Score: 4.3 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* LOW
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-79
CWE Name: CWE-79: Improper Neutralization of Input During Web Page Generation ( Cross-site Scripting )
Source: gocd

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).