Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 03 Oct 2024 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Woodpecker-ci
Woodpecker-ci woodpecker
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*
Vendors & Products Woodpecker-ci
Woodpecker-ci woodpecker

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-19T19:58:41.180Z

Updated: 2024-08-02T04:46:52.559Z

Reserved: 2024-07-15T15:53:28.323Z

Link: CVE-2024-41122

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.559Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-19T20:15:08.430

Modified: 2024-10-03T01:23:07.177

Link: CVE-2024-41122

cve-icon Redhat

No data.