Lucene search

K
rapid7blogCaitlin CondonRAPID7BLOG:FCFDAB95FFCE12D1346F6939D8A0A6F9
HistoryNov 10, 2021 - 3:44 p.m.

CVE-2021-43287 Allows Pre-Authenticated Build Takeover of GoCD Pipelines

2021-11-1015:44:13
Caitlin Condon
blog.rapid7.com
79

0.463 Medium

EPSS

Percentile

97.5%

CVE-2021-43287 Allows Pre-Authenticated Build Takeover of GoCD Pipelines

On October 26, 2021, open-source CI/CD solution GoCD released version 21.3.0, which included a fix for CVE-2021-43287, a critical information disclosure vulnerability whose exploitation allows unauthenticated attackers to leak configuration information, including build secrets and encryption keys. Both Rapid7 vulnerability researchers and community researchers were easily able to register a rogue agent, injecting themselves into GoCD builds and enabling full, pre-authenticated pipeline takeover. CVE-2021-43287 can be exploited with a single HTTP request.

While CVE-2021-43287 is still awaiting a formal CVSSv3 score and description, it’s no secret that CI/CD tooling and pipelines are high-value targets for both sophisticated and opportunistic attackers. GoCD customers should update to version 21.3.0 on an emergency basis, given the potential for exploitation to undermine the integrity of their software development pipelines. The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert and patch guidance. Rapid7’s vulnerability research team has a more detailed technical analysis of CVE-2021-43287 here.

Rapid7 customers

InsightVM and Nexpose customers can assess their exposure to CVE-2021-43287 with a remote vulnerability check available in the November 9, 2021 content release.

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

Subscribe

0.463 Medium

EPSS

Percentile

97.5%

Related for RAPID7BLOG:FCFDAB95FFCE12D1346F6939D8A0A6F9