Vulnerability Details : CVE-2023-28629
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-28629
- cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28629
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28629
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
GitHub, Inc. |
CWE ids for CVE-2023-28629
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-28629
-
https://github.com/gocd/gocd/releases/tag/23.1.0
Release GoCD 23.1.0 · gocd/gocd · GitHubRelease Notes
-
https://www.gocd.org/releases/#23-1-0
Releases - Version notes | GoCDRelease Notes
-
https://github.com/gocd/gocd/commit/c6aa644973b034305bbe9ea34b010dcf5b5790ce
Encode VSM node attributes for HTML · gocd/gocd@c6aa644 · GitHubPatch
-
https://docs.gocd.org/current/configuration/pipeline_labeling.html
Pipeline Labelling | GoCD User DocumentationProduct
-
https://github.com/gocd/gocd/commit/95f758229d419411a38577608709d8552cccf193
Improve escaping on legacy Freemarker templates · gocd/gocd@95f7582 · GitHubPatch
-
https://github.com/gocd/gocd/security/advisories/GHSA-3vvg-gjfr-q9vm
Stored XSS possible on VSM and Job Details pages via malicious pipeline label configuration · Advisory · gocd/gocd · GitHubPatch;Vendor Advisory
Jump to