Pivotal Software Concourse
By the Year
In 2023 there have been 0 vulnerabilities in Pivotal Software Concourse . Last year Concourse had 1 security vulnerability published. Right now, Concourse is on track to have less security vulnerabilities in 2023 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 0 | 0.00 |
2022 | 1 | 5.40 |
2021 | 0 | 0.00 |
2020 | 2 | 8.05 |
2019 | 2 | 7.50 |
2018 | 2 | 6.45 |
It may take a day or so for new Concourse vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pivotal Software Concourse Security Vulnerabilities
Concourse (7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9) contains an authorization bypass issue
CVE-2022-31683
5.4 - Medium
- December 19, 2022
Concourse (7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9) contains an authorization bypass issue. A Concourse user can send a request with body including :team_name=team2 to bypass team scope check to gain access to certain resources belong to any other team.
Concourse, versions prior to 6.3.1 and 6.4.1, in installations
CVE-2020-5415
10 - Critical
- August 12, 2020
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Authentication Bypass by Spoofing
Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow
CVE-2020-5409
6.1 - Medium
- May 14, 2020
Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow. A remote unauthenticated attacker could convince a user to click on a link using the OAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. (This issue is similar to, but distinct from, CVE-2018-15798.)
Open Redirect
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection
CVE-2019-3792
7.5 - High
- April 01, 2019
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
SQL Injection
Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow
CVE-2019-3803
7.5 - High
- January 12, 2019
Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
Information Disclosure
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites
CVE-2018-15798
5.4 - Medium
- December 19, 2018
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
Open Redirect
Pivotal Concourse after 2018-03-05 might allow remote attackers to have an unspecified impact, if a customer obtained the Concourse software from a DNS domain
CVE-2018-1227
7.5 - High
- March 13, 2018
Pivotal Concourse after 2018-03-05 might allow remote attackers to have an unspecified impact, if a customer obtained the Concourse software from a DNS domain that is no longer controlled by Pivotal. The original domain for the Concourse CI (concourse-dot-ci) open source project has been registered by an unknown actor, and is therefore no longer the official website for Concourse CI. The new official domain is concourse-ci.org. At approximately 4 am EDT on March 7, 2018 the Concourse OSS team began receiving reports that the Concourse domain was not responding. The Concourse OSS team discovered, upon investigation with both the original and the new domain registrars, that the originating domain registrar had made the domain available for purchase. This was done despite the domain being renewed by the Concourse OSS team through August 2018. For a customer to be affected, they would have needed to access a download from a "concourse-dot-ci" domain web site after March 6, 2018 18:00:00 EST. Accessing that domain is NOT recommended by Pivotal. Anyone who had been using that domain should immediately begin using the concourse-ci.org domain instead. Customers can also safely access Concourse software from the traditionally available locations on the Pivotal Network or GitHub.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Pivotal Software Concourse or by Pivotal Software? Click the Watch button to subscribe.
