CVE-2024-41121

Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://github.com/woodpecker-ci/woodpecker-security/issues/8 - Broken Link () https://github.com/woodpecker-ci/woodpecker-security/issues/8 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker-security/issues/9 - Broken Link () https://github.com/woodpecker-ci/woodpecker-security/issues/9 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker-security/pull/11 - Broken Link () https://github.com/woodpecker-ci/woodpecker-security/pull/11 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker/issues/3924 - Patch () https://github.com/woodpecker-ci/woodpecker/issues/3924 - Patch
References () https://github.com/woodpecker-ci/woodpecker/pull/3933 - Patch () https://github.com/woodpecker-ci/woodpecker/pull/3933 - Patch
References () https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm - Third Party Advisory () https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm - Third Party Advisory

03 Oct 2024, 15:57

Type Values Removed Values Added
References () https://github.com/woodpecker-ci/woodpecker-security/issues/8 - () https://github.com/woodpecker-ci/woodpecker-security/issues/8 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker-security/issues/9 - () https://github.com/woodpecker-ci/woodpecker-security/issues/9 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker-security/pull/11 - () https://github.com/woodpecker-ci/woodpecker-security/pull/11 - Broken Link
References () https://github.com/woodpecker-ci/woodpecker/issues/3924 - () https://github.com/woodpecker-ci/woodpecker/issues/3924 - Patch
References () https://github.com/woodpecker-ci/woodpecker/pull/3933 - () https://github.com/woodpecker-ci/woodpecker/pull/3933 - Patch
References () https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm - () https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm - Third Party Advisory
CWE NVD-CWE-noinfo
First Time Woodpecker-ci woodpecker
Woodpecker-ci
CPE cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*

22 Jul 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) Woodpecker es un motor CI/CD simple pero potente con gran extensibilidad. El servidor permite crear cualquier usuario que pueda desencadenar una canalización que ejecute workflows maliciosos: 1. Esos workflows pueden conducir a una toma de control del host que ejecuta el agente que ejecuta el workflow. 2. O permitir extraer los secretos que normalmente se proporcionarían a los complementos cuyo punto de entrada se sobrescribe. Este problema se solucionó en la versión 2.7.0. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad.

19 Jul 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 20:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41121

Mitre link : CVE-2024-41121

CVE.ORG link : CVE-2024-41121


JSON object : View

Products Affected

woodpecker-ci

  • woodpecker
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

NVD-CWE-noinfo