Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 03 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Woodpecker-ci
Woodpecker-ci woodpecker
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*
Vendors & Products Woodpecker-ci
Woodpecker-ci woodpecker

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-19T19:57:15.924Z

Updated: 2024-08-02T04:46:51.560Z

Reserved: 2024-07-15T15:53:28.323Z

Link: CVE-2024-41121

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:51.560Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-19T20:15:08.180

Modified: 2024-10-03T15:57:31.917

Link: CVE-2024-41121

cve-icon Redhat

No data.