CVE-2024-41122

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41122
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41122.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-41122
Aliases
Related
Published
2024-07-19T20:15:08Z
Modified
2025-01-14T12:17:10.520435Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/woodpecker-ci/woodpecker

Affected ranges

Type
GIT
Repo
https://github.com/woodpecker-ci/woodpecker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.13.0-rc.1
v0.13.0-rc.2
v0.13.0-rc.3
v0.14.0
v0.14.0-rc.1
v0.14.0-rc.2
v0.15.0
v0.15.0-rc1
v0.15.0-rc2
v0.8.100
v0.8.101
v0.8.102
v0.8.103
v0.8.103-login-form
v0.8.104
v0.8.105
v0.8.106
v0.8.91
v0.8.92
v0.8.93
v0.8.94
v0.8.95
v0.8.95-bitbucket
v0.8.96
v0.8.97
v0.8.98
v0.8.99
v0.9.0
v0.9.1
v0.9.2

v2.*

v2.0.0
v2.0.0-rc.0
v2.1.0
v2.1.1
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.4.0
v2.4.1
v2.5.0
v2.6.0