Description
In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field.
Remediation
References
https://github.com/gocd/gocd/commit/7d0baab0d361c377af84994f95ba76c280048548
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924%2C
Related Vulnerabilities
CVE-2022-31023 Vulnerability in maven package com.typesafe.play:play_2.13
CVE-2022-25167 Vulnerability in maven package org.apache.flume:flume-parent
CVE-2018-20677 Vulnerability in maven package org.webjars.npm:bootstrap
CVE-2023-36479 Vulnerability in maven package org.eclipse.jetty:jetty-servlets