Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-56322
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Jan, 2025 | 16:15
Updated At-01 Aug, 2025 | 19:24

GoCD is a continuous deliver server. GoCD versions 16.7.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse a hidden/unused configuration repository (pipelines as code) feature to allow XML External Entity (XXE) injection on the GoCD Server which will be executed when GoCD periodically scans configuration repositories for pipeline updates, or is triggered by an administrator or config repo admin. In practice the impact of this vulnerability is limited, in most cases without combining with another vulnerability, as only GoCD (super) admins have the ability to abuse this vulnerability. Typically a malicious GoCD admin can cause much larger damage than that they can do with XXE injection. The issue is fixed in GoCD 24.5.0. As a workaround, prevent external access from the GoCD server to arbitrary locations using some kind of environment egress control.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.02.1LOW
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 2.1
Base severity: LOW
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

thoughtworks
thoughtworks
>>gocd>>Versions from 16.7.0(inclusive) to 24.5.0(exclusive)
cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-611Primarysecurity-advisories@github.com
CWE ID: CWE-611
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733security-advisories@github.com
Patch
https://github.com/gocd/gocd/releases/tag/24.5.0security-advisories@github.com
Release Notes
https://github.com/gocd/gocd/security/advisories/GHSA-8xwx-hf68-8xq7security-advisories@github.com
Vendor Advisory
https://www.gocd.org/releases/#24-5-0security-advisories@github.com
Release Notes
Hyperlink: https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/gocd/gocd/releases/tag/24.5.0
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/gocd/gocd/security/advisories/GHSA-8xwx-hf68-8xq7
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://www.gocd.org/releases/#24-5-0
Source: security-advisories@github.com
Resource:
Release Notes
Change History
0Changes found

Details not found