Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
GoCD API authentication of user access tokens subject to timing attack during comparison
Vulnerability Description
GoCD is a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for continuous delivery of your product. GoCD versions from 19.2.0 to 19.10.0 (inclusive) are subject to a timing attack in validation of access tokens due to use of regular string comparison for validation of the token rather than a constant time algorithm. This could allow a brute force attack on GoCD server API calls to observe timing differences in validations in order to guess an access token generated by a user for API access. This issue is fixed in GoCD version 19.11.0. As a workaround, users can apply rate limiting or insert random delays to API calls made to GoCD Server via a reverse proxy or other fronting web server. Another workaround, users may disallow use of access tokens by users by having an administrator revoke all access tokens through the "Access Token Management" admin function.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Vulnerability Type
通过时间差异性导致的信息暴露
Vulnerability Title
GoCD 安全漏洞
Vulnerability Description
GoCD是一个持续交付服务器。 GoCD 19.2.0到19.11.0版本存在安全漏洞,该漏洞源于使用常规字符串比较来验证令牌而不是恒定时间算法,攻击者利用该漏洞可以对 GoCD 服务器 API 调用进行暴力攻击。
CVSS Information
N/A
Vulnerability Type
N/A