An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker in control of a GoCD Agent can plant malicious JavaScript into a failed Job Report.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.gocd.org/releases/#21-3-0 | issue tracking release notes vendor advisory |
https://github.com/gocd/gocd/commit/f5c1d2aa9ab302a97898a6e4b16218e64fe8e9e4 | third party advisory patch |
https://blog.sonarsource.com/gocd-vulnerability-chain | exploit third party advisory patch |