Vulnerability Details : CVE-2022-24832
GoCD is an open source a continuous delivery server. The bundled gocd-ldap-authentication-plugin included with the GoCD Server fails to correctly escape special characters when using the username to construct LDAP queries. While this does not directly allow arbitrary LDAP data exfiltration, it can allow an existing LDAP-authenticated GoCD user with malicious intent to construct and execute malicious queries, allowing them to deduce facts about other users or entries within the LDAP database (e.g alternate fields, usernames, hashed passwords etc) through brute force mechanisms. This only affects users who have a working LDAP authorization configuration enabled on their GoCD server, and only is exploitable by users authenticating using such an LDAP configuration. This issue has been fixed in GoCD 22.1.0, which is bundled with gocd-ldap-authentication-plugin v2.2.0-144.
Products affected by CVE-2022-24832
- cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24832
1.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24832
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N |
1.8
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2022-24832
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-24832
-
https://github.com/gocd/gocd-ldap-authentication-plugin/releases/tag/v2.2.0-144
Release 2.2.0-144 · gocd/gocd-ldap-authentication-plugin · GitHubRelease Notes;Third Party Advisory
-
https://github.com/gocd/gocd/pull/10244
Bump bundled gocd-ldap-authentication-plugin to v2.2.0-144 by chadlwilson · Pull Request #10244 · gocd/gocd · GitHubPatch;Third Party Advisory
-
https://www.gocd.org/releases/#22-1-0
Releases - Version notes | GoCDRelease Notes;Vendor Advisory
-
https://github.com/gocd/gocd/releases/tag/22.1.0
Release GoCD 22.1.0 · gocd/gocd · GitHubRelease Notes;Third Party Advisory
-
https://github.com/gocd/gocd-ldap-authentication-plugin
GitHub - gocd/gocd-ldap-authentication-plugin: LDAP authentication plugin for GoCDProduct;Third Party Advisory
-
https://github.com/gocd/gocd-ldap-authentication-plugin/commit/87fa7dac5d899b3960ab48e151881da4793cfcc3
Escape/encode values when building search filters. · gocd/gocd-ldap-authentication-plugin@87fa7da · GitHubPatch;Third Party Advisory
-
https://docs.gocd.org/22.1.0/configuration/dev_authentication.html#ldapad-authentication
Authentication | GoCD User DocumentationVendor Advisory
-
https://github.com/gocd/gocd/security/advisories/GHSA-x5v3-x9qj-mh3h
Bundled ldap-authentication-plugin fails to neutralise LDAP special elements in usernames · Advisory · gocd/gocd · GitHubThird Party Advisory
Jump to