An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.gocd.org/releases/#21-3-0 | vendor advisory release notes issue tracking |
https://github.com/gocd/gocd/commit/41abc210ac4e8cfa184483c9ff1c0cc04fb3511c | third party advisory patch |
https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover | patch third party advisory exploit |