Skip to content

DOM-based XSS possible via a pipeline run's stage detail graphs

Moderate
chadlwilson published GHSA-qcg6-4q44-3589 May 7, 2022

Package

gocd-server

Affected versions

>= 19.11.0, < 22.1.0

Patched versions

22.1.0

Description

Impact

GoCD versions 19.11.0 through 21.4.0 (inclusive) are vulnerable to a DOM-based XSS attack via a pipeline run's Stage Details > Graphs tab. It is possible for a malicious script on a attacker-hosted site to execute script that will run within the user's browser context and GoCD session via abuse of a messaging channel used for communication between with the parent page and the stage details graph's iframe. This could allow an attacker to steal a GoCD user's session cookies and/or execute malicious code in the user's context.

Patches

Fixed in GoCD 22.1.0.

Workarounds

No known workarounds.

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVE ID

CVE-2022-29182

Weaknesses

Credits