GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions.
History

Wed, 23 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-09-07T22:55:10.000Z

Updated: 2025-04-23T17:13:25.278Z

Reserved: 2022-07-15T00:00:00.000Z

Link: CVE-2022-36088

cve-icon Vulnrichment

Updated: 2024-08-03T09:52:00.516Z

cve-icon NVD

Status : Modified

Published: 2022-09-07T23:15:14.170

Modified: 2024-11-21T07:12:21.570

Link: CVE-2022-36088

cve-icon Redhat

No data.